The white paper is the second of the three. In it we detail the vulnerabilities typically found in OPC hosts, based on OPC’s current architecture (such as the use of DCOM) and the typical underlying operating system.