Has anyone performed a rudimentary (or other) analysis of the PROTOS tool and it's capabilities? It seems there is quite a bit of uncertainty floating around about the vulnerabilities it exploits. Any analysis comments are welcome. Thanks. -Joshua Wright Team Leader, Networks and Systems Johnson & Wales University Joshua.Wrightat_private pgpkey: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xD44B4A73 fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73
This archive was generated by hypermail 2b30 : Thu Feb 14 2002 - 14:26:20 PST