"Deepak Misra" <[EMAIL PROTECTED]> writes:
> So how is this done ? By hacking passwords ?

Typically that is unnecessary. Most system admins are bad at avoiding
versions of software with security holes.

Perry

Reply via email to