Full Disclosure mailing list archives

Re: security industry software license


From: Valdis.Kletnieks () vt edu
Date: Fri, 17 Oct 2008 08:45:21 -0400

On Thu, 16 Oct 2008 21:41:02 BST, n3td3v said:
... that criminal hackers use metasploit as well.

Criminals use gmail too. n3td3v uses Gmail. Therefor....

Criminals use the phone too. n3td3v probably knows how to use the phone. Therefor...

Criminals use beds to sleep. n3td3v probably uses a bed or a crib or something. Therefor..

You *really* don't want to follow that idea to its logical conclusion.

Attachment: _bin
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: