Hi
I thought this article would be of interest for some of you here:
W
Interesting for those understanding the technology of the workings of exploits. More information on detection and elimination would be helpful.