It is an exploit if, had it been done against an M$ product or *nux, you'd be calling it an exploit.
It is a hack if, had it been done against a M$ product or *nux, it would be a hack.
It is a...
Search:Type: Posts; User: keith2468; Keyword(s): Search: Search took 0.02 seconds.
Results 1 to 1 of 1
|
|