Full Disclosure mailing list archives
Re: requesting info
From: Tim <tim-security () sentinelchicken org>
Date: Wed, 25 Apr 2007 08:04:11 -0400
i'm just a new guy to this community...i was asking about the right procedures that one should do when he/she discovers a vulnerability in and application or operating system also what is the right procedure to make in order to publish a new hacking technique to that it's know by the name of the publisher
This is a topic of much debate, so you'll get lots of different answers. Maybe people do rely on [1] for the basis of their disclosure policy, though. tim 1. http://www.wiretrip.net/rfp/policy.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- requesting info n n (Apr 25)
- Re: requesting info Tim (Apr 25)
- <Possible follow-ups>
- requesting info n n (Apr 25)
- Re: requesting info Paul Sebastian Ziegler (Apr 25)
- Re: requesting info Michael Holstein (Apr 25)
- Re: requesting info Jason Miller (Apr 25)
- Re: requesting info James Matthews (Apr 25)