[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY103-F1909F791D7FDF116BE31B7BF490@phx.gbl>
Date: Wed, 25 Apr 2007 11:48:22 +0000
From: "n n" <s_x_dls@...mail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: requesting info
Hi all,
i'm just a new guy to this community...i was asking about the right
procedures that one should do when he/she discovers a vulnerability in and
application or operating system
also what is the right procedure to make in order to publish a new hacking
technique to that it's know by the name of the publisher
thanks alot for your help
_________________________________________________________________
Txt a lot? Get Messenger FREE on your mobile.
https://livemessenger.mobile.uk.msn.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists