> Finding vulnerabilities and how to exploit them to run malware > in closed source code is nigh on impossible.
which explains why it never happens </snark> randy --- ra...@psg.com `gpg --locate-external-keys --auto-key-locate wkd ra...@psg.com` signatures are back, thanks to dmarc header butchery