Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Okay, but how? Is someone reading commands in a "how the exploit works" write-up and... running them?


Never underestimate human stupidity, especially when it comes to IT.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: