On Wednesday 22 August 2007 10:08, John E. Perry wrote: > Joachim Schrod wrote: > > ... > > Let me propose another hilarious 5-step process: > > > > 1. Read the LWN.net security page. > > OK, so I did. > > > 2. Detect how many exploits are based on data files, and not > > on executables. just last week: ... > > Not a single exploit listed. Many vulnerabilities, almost all qualified > as "user-assisted" or "local. > > > 3. Stop feeling so smug. > > I know of no one who's "feeling smug" -- except maybe you?
I feel smug. Or was that smog? *looks outside at brown air...* Okay, maybe that *was* smog. Nevermind. -- kai ponte www.perfectreign.com -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
