Vulnerability Development mailing list archives
Re: What to do with a vulerability?
From: "The Blueberry" <acr872k () hotmail com>
Date: Tue, 21 Jan 2003 02:59:33 +0000
If you're wondering if a process hidden in this way can be detected, then release a simple proof-of-concept program, and invite the list readers to come up with a countermeasure. *****Your code needn't be viral or designed to spread in any way.*****
Please explain yourself a bit more because a non-viral code is easily turned into a viral one...
~TB _________________________________________________________________Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail
Current thread:
- What to do with a vulerability? Oliver Lavery (Jan 17)
- Re: What to do with a vulerability? Blue Boar (Jan 20)
- <Possible follow-ups>
- Re: What to do with a vulerability? The Blueberry (Jan 23)
- Re: What to do with a vulerability? Blue Boar (Jan 24)