On Jo, 08 mar 12, 16:54:09, Stayvoid wrote:
> Hello.
>
> "The presence, for example, of development utilities (a C compiler) or
> interpreted languages (such as perl - but see below -, python, tcl...)
> may help an attacker compromise the system…"
> "So, without Perl and, unless you remake these u
Hello.
"The presence, for example, of development utilities (a C compiler) or
interpreted languages (such as perl - but see below -, python, tcl...)
may help an attacker compromise the system…"
"So, without Perl and, unless you remake these utilities in shell
script, you will probably not be able
2 matches
Mail list logo