-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2014-04-12 01:02, Ted Byers wrote:
On Fri, Apr 11, 2014 at 6:31 PM, Carlos E. R. <> wrote:
...
had reviewed, and then write several programs to attack it, so they can see, experimentally, hands on, the nature of the vulnerability they almost created, how to exploit it, and how to write the code in the most secure manner possible.
Alas, I doubt there are very many software houses that would support such continuing education of their software development staff. :-(
I would probably fail that testing myself. :-} There was no multitasking when I trained, and it was never a consideration when I was paid for programing. I never had to care about intruders or any kind of attacks. Security, for me, was ensuring that motors would stop when requested, and such... Buffers having the correct size, properly initialized, inside bounds, etc, of course. Accidents, not hackers, were my consideration. So no, I probably could not code current day security stuff. :-} - -- Cheers / Saludos, Carlos E. R. (from 13.1 x86_64 "Bottle" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iEYEARECAAYFAlNIkyAACgkQtTMYHG2NR9XEkwCfQ2ucE6pP7+WSMy9yaD1+eshc PJsAn24r5mZWLhRv4upycmdjq3VF5hRe =PQNh -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org