[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY103-F9BDAF7480E03642F7EF89BF490@phx.gbl>
Date: Wed, 25 Apr 2007 12:02:32 +0000
From: "n n" <s_x_dls@...mail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: requesting info
Hi all,
i'm just a new guy to this community...i was asking about the right
procedures that one should do when he/she discovers a vulnerability in and
application or operating system
also what is the right procedure to make in order to publish a new hacking
technique to that it's know by the name of the publisher
thanks alot for your help
_________________________________________________________________
Solve the Conspiracy and win fantastic prizes.
http://www.theconspiracygame.co.uk/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists