Vorlon Blog: Bite sized breaches (4)