On Wed, Nov 12, 2003 at 10:33:11PM -0800, Gadi Evron wrote:
> 3. No source (!!) available for people to examine, thus making it, to a
>    level, harder to locate security "holes" - for outsides in any case.

Once upon a time there was no possibility to examine object code.
Little Red Riding Hood and her Wolf guarded all object code from
being decompiled, disassembled and debugged by the Grandma. And
they all lived happily ever after.

> I can come up with a few more.

Thank you very much, that was enough already.

VB.
-- 
Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany
Phone +49 (7524) 912142, Fax +49 (7524) 996807, [EMAIL PROTECTED]
http://fdik.org, Deutsches IRCNet [EMAIL PROTECTED]
PGP-Key: http://www.x-pie.de/vb.asc

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to