On 3/21/2013 5:12 AM, John R. Dennison wrote:
Most "penetration testing" is done via lackadaisical auditors using automated tools that are pretty much completely worthless in the real world using Enterprise Linux as said tools are unaware of backporting policies.
indeed, they are automated checklist checkers.