A comprehensive flow chart and links describing the process and tools of penetration testing. via digg
This entry was posted on Wednesday, July 12th, 2006 at 9:18 am and is filed under PC Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.