The important element is that you fix the list of vulnerabilities and test again.
It's like an MoT only as good as the day it was carried out on.
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register - Independent news and views for the tech community. Part of Situation Publishing
Biting the hand that feeds IT © 1998–2021