On Wed, Nov 12, 2003 at 10:33:11PM -0800, Gadi Evron wrote: > 3. No source (!!) available for people to examine, thus making it, to a > level, harder to locate security "holes" - for outsides in any case.
Once upon a time there was no possibility to examine object code. Little Red Riding Hood and her Wolf guarded all object code from being decompiled, disassembled and debugged by the Grandma. And they all lived happily ever after. > I can come up with a few more. Thank you very much, that was enough already. VB. -- Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany Phone +49 (7524) 912142, Fax +49 (7524) 996807, [EMAIL PROTECTED] http://fdik.org, Deutsches IRCNet [EMAIL PROTECTED] PGP-Key: http://www.x-pie.de/vb.asc _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
