13Oct2009 (UTC +8)

On Mon, Oct 12, 2009 at 17:29, Oscar Plameras <[email protected]> wrote:
> Well think about it. Votes are counted by generating a record for
> instance for each vote.
> This one step.
>
> Once all the records for each vote is counted, you have a set of
> programs to tabulate or tally
> this recordes.
>
> It's that simple, that's why.

I wish source code analysis was as simple as evaluating whether
"X=X++;" or "X=++X;" is a more accurate computation.

But it's not.

One of the things a source code evaluator does is to check the data
flow diagram of an application. Then do a risk assessment of it. Then
one can see why it's not so simple... and why an application becomes
complex because of the many security features that are built in it
(like encryption, authentication, buffer-overflow protection, etc.).



Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
http://www.laggui.com  ( Singapore / Manila / California )
Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to