Timing-based assault does not require vulnerabilities to breach system. This story continues at http://www.databasejournal.com/news/article.php/3692411
_______________ Thanks, Linda
Forum Rules