On 3/21/2013 5:12 AM, John R. Dennison wrote: > Most "penetration testing" is done via lackadaisical auditors using > automated tools that are pretty much completely worthless in the real > world using Enterprise Linux as said tools are unaware of backporting > policies. indeed, they are automated checklist checkers. -- john r pierce 37N 122W somewhere on the middle of the left coast