Carlos Alberto Lopez Perez <clo...@igalia.com> writes:

> Attackers usually don't start trying to probe exploit after exploit.

Of course they do.  That is, *by far*, the most common attacker strategy
on the Internet.  Just look at the logs of any Internet-facing service.

-- 
Russ Allbery (r...@debian.org)               <http://www.eyrie.org/~eagle/>

Reply via email to