Viewing 2 posts - 1 through 2 (of 2 total)
OK, if an attacker compromises the system using buffer overrun for example then she will get a highest privilage of access and delete all the stored procedures or any blockers...
September 20, 2006 at 10:50 am
Thanks for all your posts so far, it was really excited reading them all. When I finished my project and this article I started thinking of many other ways I could...
August 15, 2006 at 10:06 pm