Re: What to do with a vulerability?

From: Martin Mačok (martin.macokat_private)
Date: Fri Jan 24 2003 - 13:43:17 PST

  • Next message: Marc Maiffret: "SQL Sapphire Worm Analysis"

    On Thu, Jan 23, 2003 at 07:47:46PM -0500, Oliver Lavery wrote:
    
    > Incidentally, yeah, I do assume that code which demonstrates how to
    > hide stuff your computer is doing/storing will not have very many
    > positive applications. 
    
    Could be pretty useful for honeypots, syslog and IDS.
    
    -- 
             Martin Mačok                 http://underground.cz/
       martin.macokat_private        http://Xtrmntr.org/ORBman/
    



    This archive was generated by hypermail 2b30 : Fri Jan 24 2003 - 15:32:50 PST