Correct.  But some of these tasks might show up in almost any business if a
crime has occurred.  For example, I know a few examples of the technical
staff of software development companies doing research to support software
piracy investigations.

Richard

-----Original Message-----
From: David Harley [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, July 02, 2008 12:25 PM
To: 'Richard M. Smith'; 'FunSec [List]'
Subject: RE: [funsec] I suppose it is a fake thing or a misunderstanding :?

> I don't see it.  Which clause do you think applies?

I don't suppose Larry was suggesting that these clauses really apply. But I
can see how many tasks I remember being set during my time in support might
have been seen as falling into one or more of these categories.

--
David Harley, ESET Research Author
AVIEN COO: http://www.avien.org 
http://www.smallblue-greenworld.co.uk  



_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to