> Finding vulnerabilities and how to exploit them to run malware > in closed source code is nigh on impossible. which explains why it never happens </snark> randy --- randy at psg.com `gpg --locate-external-keys --auto-key-locate wkd randy at psg.com` signatures are back, thanks to dmarc header butchery