Carlos Alberto Lopez Perez <clo...@igalia.com> writes: > Attackers usually don't start trying to probe exploit after exploit.
Of course they do. That is, *by far*, the most common attacker strategy on the Internet. Just look at the logs of any Internet-facing service. -- Russ Allbery (r...@debian.org) <http://www.eyrie.org/~eagle/>