Vulnerability Development mailing list archives

Re: What to do with a vulerability?


From: "The Blueberry" <acr872k () hotmail com>
Date: Tue, 21 Jan 2003 02:59:33 +0000

If you're wondering if a process hidden in this way can be detected, then release a simple proof-of-concept program, and invite the list readers to come up with a countermeasure. *****Your code needn't be viral or designed to spread in any way.*****

Please explain yourself a bit more because a non-viral code is easily turned into a viral one...

~TB

_________________________________________________________________
Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail


Current thread: