On 12/6/23 11:51 PM, Suzanne Brinton wrote:
In effect, conducting penetration testing is similar to hiring security consultants to attempt a security attack of a secure facility to find out how real criminals might do it. The results are used by organizations to make their applications more
secure.
If you want "security" - FIRST OFF just DUMP Winders !!!
--- SoupGate-Win32 v1.05
* Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)