> Finding vulnerabilities and how to exploit them to run malware
> in closed source code is nigh on impossible. 

which explains why it never happens </snark>

randy

---
ra...@psg.com
`gpg --locate-external-keys --auto-key-locate wkd ra...@psg.com`
signatures are back, thanks to dmarc header butchery

Reply via email to