03-01-2006, 12:14 AM
Disassembling and analyzing security exploits reveals their threat potential -- here's how to start your investigation
http://www.infoworld.com/article/06/02/2...ise_1.html
http://www.infoworld.com/article/06/02/2...ise_1.html