jnf wrote:
Someone just suggested ctags, I've never heard of ctags or cscope- I will
look at them. I don't really know what I was looking for,
ctags kind turns C source code into hypertext: you put your cursor on a
function call in a source file, press the magic key, and vi[m] jumps to
the app
some advice ...
look for tools to generate callgraphs from dynamic (runtime) analysis and
static (run them over the compiler binary or the source code) analysis.
graphing those relationships can be useful. one example:
http://monkey.org/~jose/graphing/syscalls/
look for tools to do contr
On 5/3/04 11:48 AM, "ljknews" <[EMAIL PROTECTED]> wrote:
> At 10:04 AM -0500 5/3/04, jnf wrote:
>
>> Someone just suggested ctags, I've never heard of ctags or cscope- I will
>> look at them. I don't really know what I was looking for, I often find it
>> quite furstrating trying to keep track of
Crispin said:
> But taking the remark seriously, it says that you must not trust
> anything that you don't have source code for. The point of
> Thompson's
> paper is that this includes the compiler; having the source
> code for the
> applications and the OS is not enough, and even having the
At 10:04 AM -0500 5/3/04, jnf wrote:
>Someone just suggested ctags, I've never heard of ctags or cscope- I will
>look at them. I don't really know what I was looking for, I often find it
>quite furstrating trying to keep track of whats going on across XX global
>variables inside of XX internal
At 5:53 PM -0500 4/30/04, jnf wrote:
hi, simple question that is not very technicla in itself- when auditing
>software, I often find it had to stay focused and follow the code so to
>speak, especially when jumping across X source files and Y functions
>inside of each source file, I was just cur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Someone just suggested ctags, I've never heard of ctags or cscope- I will
look at them. I don't really know what I was looking for, I often find it
quite furstrating trying to keep track of whats going on across XX global
variables inside of XX inte
jnf wrote:
hi, simple question that is not very technicla in itself- when auditing
software, I often find it had to stay focused and follow the code so to
speak, especially when jumping across X source files and Y functions
inside of each source file, I was just curious how others cope with such
Fabien wrote:
I'm on the list since more or less one month and I have seen a lot of
discussion about the "safety" of a language. And since I use language
like Python or PHP, I would like to have your opinion about such language.
Your question is quite broad, so I'll give some quick answers along
Tad Anhalt wrote:
Jeremy Epstein wrote:
I agree with much of what he says about the potential for
infiltration of bad stuff into Linux, but he's comparing apples and
oranges. He's comparing a large, complex open source product to a
small, simple closed source product. I claim that if you ig
Tad Anhalt wrote:
Jeremy Epstein wrote:
I agree with much of what he says about the potential for
infiltration of bad stuff into Linux, but he's comparing apples and
oranges. He's comparing a large, complex open source product to a
small, simple closed source product. I claim that if you
This is a repost of a email I found on vuln-dev from last year. I
thought it could season some fruitful discussions here
Maybe Steven have a newer version available? Would be nice with some
illustrations to each vulnerability listed.
I for one have difficulties understanding the "off-by-one"
v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hi, simple question that is not very technicla in itself- when auditing
software, I often find it had to stay focused and follow the code so to
speak, especially when jumping across X source files and Y functions
inside of each source file, I was ju
13 matches
Mail list logo