On Sat, 30 Apr 1994, Paul A Vixie wrote: > a bad guy finds a hole > lots of bad guys use the hole > some good guy notices the hole being used, and tells CERT I would say it's more like, "good guy"/"security related individual" finds hole "bad guy" breaks into "good guys" machine and steals hole/software or "good guy" gives information to "bad guy" hole is actively exploited I would say that is more realistic in most cases. - Oliver