On Thursday 15 December 2005 09:26, Jose Nazario wrote: > if the person can develop exploits against the holes in the code, what > makes you think they can't fire up a runtime debugger and trace the code > execution and discover the same things?
Nothing makes me think that at all; in fact, I was quite skeptical of the various product claims, which is why I wanted to hear about others' experience with them. Cheers, Ken -- KRvW Associates, LLC http://www.KRvW.com _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php