Quote:
Originally Posted by Hollywood
Joe you b00n, they exploited MS Outlook but only to get into the system, they didn't use e-mail to actually get the source. Rude says it was a keylogger but I assume it was trojan that gave the attacker full access tot he system, and they just transfered the source.
|
Oh I see they used the vunurability from Outlook to hack his system, gotya.