Nothing. On Fri, Sep 03, 2004 at 04:35:24PM -0500, xbud wrote: > Actually this sounds like someone stole Litchfield's research - but what do I > know. Just seems like too much coincidence since his last talk dealt with > procedure based vulns. >
-- Richard Johnson, CISSP Senior Security Researcher iDEFENSE Inc. [EMAIL PROTECTED] Get paid for security stuff!!!!!! http://www.idefense.com/contributor.html and become part of our research team! http://idefense.bugtraq.org/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
