[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <50046.1224247521@turing-police.cc.vt.edu>
Date: Fri, 17 Oct 2008 08:45:21 -0400
From: Valdis.Kletnieks@...edu
To: full-disclosure@...ts.grok.org.uk
Subject: Re: security industry software license
On Thu, 16 Oct 2008 21:41:02 BST, n3td3v said:
> ... that criminal hackers use metasploit as well.
Criminals use gmail too. n3td3v uses Gmail. Therefor....
Criminals use the phone too. n3td3v probably knows how to use the phone. Therefor...
Criminals use beds to sleep. n3td3v probably uses a bed or a crib or something. Therefor..
You *really* don't want to follow that idea to its logical conclusion.
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists