Quote:
Originally Posted by cambaby
There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".
Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.
|
that's pretty clueless dude
and no, I'm not paid to bash CCBill.