On Wednesday 22 August 2007 10:08, John E. Perry wrote:
> Joachim Schrod wrote:
> > ...
> > Let me propose another hilarious 5-step process:
> >
> > 1. Read the LWN.net security page.
>
> OK, so I did.
>
> > 2. Detect how many exploits are based on data files, and not
> >    on executables. just last week: ...
>
> Not a single exploit listed.  Many vulnerabilities, almost all qualified
> as "user-assisted" or "local.
>
> > 3. Stop feeling so smug.
>
> I know of no one who's "feeling smug" -- except maybe you?

I feel smug.

Or was that smog?

*looks outside at brown air...*

Okay, maybe that *was* smog.

Nevermind.

-- 
kai ponte
www.perfectreign.com
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to