Le 2 août 09 à 18:43, Colin Holgate a écrit :


On Aug 2, 2009, at 12:35 PM, Pierre Sahores wrote:

But in terms of real ability to fill very unfriendly code to the client-side computer, 100 k is enought to kill anything of the local file-system and even the hard-disk it-self by speeding it up until it definitivelly crash via a 6ko sniplet. So, if 100 k is enought to kill and hack anything, both, the Java or Flash security models are only non-sense in anything else out of marketing considerations.

This isn't a worry, because the 100k is effectively a text file, and Flash has no way to execute the file. It's only for storing things like preferences.

Would not be a good idea to insist and i will hangup there after just some last words : this is just what the marketing says. Any master2 n- tier security course just make us green about all what can, in fact, be done behind the scene. In my own case, the best i learned about the subject credits more an army officier thesis than the unmodeled course contents...

...,


Pierre



--
Pierre Sahores
mobile : 06 03 95 77 70
www.sahores-conseil.com


_______________________________________________
use-revolution mailing list
[email protected]
Please visit this url to subscribe, unsubscribe and manage your subscription preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution




_______________________________________________
use-revolution mailing list
[email protected]
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to