| CD duplication [message #89056] |
Sun, 19 August 2007 04:49  |
John [1]
Messages: 2229 Registered: September 2005
|
Senior Member |
|
|
3/zVpc0d0Bn/mv
+7ofgs+nFtd0f5s+a+n94Usv7F6vwa6kdqn7Qfo8j+DCG++KYl+prEGFseUu
L0tvnHyD3jbMps2e6prI2GYm/uB57T7
|
|
|
|
| Re: CD duplication [message #89094 is a reply to message #89056] |
Mon, 20 August 2007 02:23  |
Sarah
 Messages: 608 Registered: February 2007
|
Senior Member |
|
|
onal data, including SMS text messages, contact information,
call history, voice mail information, passwords, e-mail messages and browsing
history.
Miller told eWEEK that with Moore's Metasploit work, the time needed to write
iPhone exploits has substantially shrunk. "One thing interesting about the
work H.D.'s done, if you look at the time frame, is it took us two days to
find a vulnerability and write something to where we knew it was legitimate.
[It took] seven or eight days after that to having a working exploit. If
we had what H.D. has done, it would have taken maybe a day or less. Having
this availa
|
|
|
|