This is relatively easy to exploit. It takes some degree of social engineering -- the attacker would have to draw people to a malicious Web site -- but after that, there's no further intervention required. An attacker could leverage this to write to a file on the hard drive. And once you can write to a person's machine, you have full control.

-Michael Sutton

Select a background
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image
Awesome background image

More quotes by Michael Sutton