by Ben Malisow
This article originally appeared on SecurityFocus.com -- reproduction in whole or in part is not allowed without expressed written consent.