Secure Coding mailing list archives

Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis


From: ljknews at mac.com (ljknews)
Date: Mon, 22 Jan 2007 18:14:51 -0500

At 3:10 PM -0800 1/22/07, Blue Boar wrote:
ljknews wrote:
Analyzing source code is independent of machine architecture.

My guess is that if a company actually is capable of analyzing
binary code they only do it for the highest volume instruction
sets.

My guess is that attackers will go after machines they feel are
less protected.

Efforts which merely change attacker behavior are a waste of time.

Nope. If I'm running x86 boxes, I'd be more than happy to have to
attackers move to SPARC.

Those of us _not_ running X86 do not feel that way.
-- 
Larry Kilgallen


Current thread: