|
This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. -- [ Picked text/plain from multipart/alternative ] > Are we not all missing the point here?? > In order to use the use the System Request menu the user has > signed on. They have a user ID and password. If this is an > unauthorised person the system is already compromised. I don't think I missed that point Syd, this is a quote from my first post on this subject; "The problem with this 'vulnerability' is that you need to actually be on the machine to use it, although it's not quite the chicken & egg situation that it first sounds like - it can help once you're on the system by making life easier to determine which user profile(s) you *should* hijack to give you more access rights." --phil
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.