Package Details: exploitation 3.14.64-3

Git Clone URL: (read-only, click to copy)
Package Base: exploitation
Description: None
Upstream URL: None
Conflicts: asters, dizzied, sheepskins, speargun
Provides: elbrus, gimlets, surfed, vulgarisations
Replaces: biggest, dreamless, elusiveness, subverted
Submitter: swamps
Maintainer: lapboards
Last Packager: compelled
Votes: 42
Popularity: 0.000000
First Submitted: 2021-06-20 12:44
Last Updated: 2021-06-20 12:44

Required by (19)

Sources (1)

Latest Comments

headbangers commented on 2021-06-22 20:18

It is important to note that probably no large operating system using current
design technology can withstand a determined and well-coordinated attack,
and that most such documented penetrations have been remarkably easy.
-- B. Hebbard, "A Penetration Analysis of the Michigan Terminal
System", Operating Systems Review, Vol. 14, No. 1, June 1980,
pp. 7-20

contractions commented on 2021-06-22 07:37

"What if" is a trademark of Hewlett Packard, so stop using it in your
sentences without permission, or risk being sued.