<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Thank God for Honey Monkeys</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=568" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=568</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=568&#038;cpage=1#comment-859</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 09 Aug 2005 12:39:16 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=568#comment-859</guid>
		<description><![CDATA[To clarify: it is unlikely for anyone in our profession to have details (not a swipe against Adam).
]]></description>
		<content:encoded><![CDATA[<p>To clarify: it is unlikely for anyone in our profession to have details (not a swipe against Adam).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=568&#038;cpage=1#comment-858</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Tue, 09 Aug 2005 12:38:03 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=568#comment-858</guid>
		<description><![CDATA[Anything that indicates suspicion or belief rather than fact is fine w/ me. Of course, he may have facts, but my experience has been that that is unlikely.
]]></description>
		<content:encoded><![CDATA[<p>Anything that indicates suspicion or belief rather than fact is fine w/ me. Of course, he may have facts, but my experience has been that that is unlikely.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Axel Eble</title>
		<link>http://spiresecurity.com/?p=568&#038;cpage=1#comment-857</link>
		<dc:creator>Axel Eble</dc:creator>
		<pubDate>Tue, 09 Aug 2005 07:02:16 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=568#comment-857</guid>
		<description><![CDATA[If Adam had written &quot;We&#039;ve always expected that there&#039;s lots of exploit code...&quot; - would you have been fine with that? ;-)

]]></description>
		<content:encoded><![CDATA[<p>If Adam had written &#8220;We&#8217;ve always expected that there&#8217;s lots of exploit code&#8230;&#8221; &#8211; would you have been fine with that? <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: adam S</title>
		<link>http://spiresecurity.com/?p=568&#038;cpage=1#comment-856</link>
		<dc:creator>adam S</dc:creator>
		<pubDate>Tue, 09 Aug 2005 03:51:01 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=568#comment-856</guid>
		<description><![CDATA[Ummm, from page 2 of Lemos&#039; article:

&lt;blockquote&gt;
In early July 2005, the project discovered its first exploit for a vulnerability that had not been publicly disclosed, the researchers said in the paper. The attack used the JView profiler vulnerability that Microsoft announced later in July. Known as &quot;zero-day&quot; exploits, such attack methods could be especially pernicious if widely used before Microsoft updated its user base with protections.
&lt;/blockquote&gt;


]]></description>
		<content:encoded><![CDATA[<p>Ummm, from page 2 of Lemos&#8217; article:</p>
<blockquote><p>
In early July 2005, the project discovered its first exploit for a vulnerability that had not been publicly disclosed, the researchers said in the paper. The attack used the JView profiler vulnerability that Microsoft announced later in July. Known as &#8220;zero-day&#8221; exploits, such attack methods could be especially pernicious if widely used before Microsoft updated its user base with protections.
</p></blockquote>
]]></content:encoded>
	</item>
</channel>
</rss>
