logo

New Response

« Return to the blog entry

You are replying to:

  1. Hi Jake,

    Useful discussion going on here. One thing I've always appreciated about the MythBusters show is that when they get into describing a process that someone could very easily turn into malicious use, they omit an important piece of the equation (and say they've done so).

    I'd kind of like to see that with your posts on these topics. I don't think we need to be training script kiddies on these techniques. Point out the issue, explain why it's an issue, perhaps lead down the trail, but a complete working example of an exploit is not really a good idea.

    My 2 cents.

    As always though, love your stuff.

Your Comments

Name:
E-mail:
(optional)
Website:
(optional)
Comment: