Vulnerability Development mailing list archives

Re: How to Write Secure Code


From: lmolina () COL1 TELECOM COM CO (Lucio A.Molina F.)
Date: Fri, 10 Mar 2000 23:48:22 -0500


I recomend you the next internet  address

http://www.argo.es/~jcea/artic/prg_seg.htm

but is in spanish

Cheers

Lucio Augusto Molina Focazzio
Certified Information Systems Auditor - CISA
ISACA, Bogotá Chapter President
Audicai Ltda. CEO
Tels. (571) 6271751
Fax   (571) 2743875
Cel.  (573) 2400063
Santafé de Bogotá, Colombia

-----Mensaje original-----
De: VULN-DEV List [mailto:VULN-DEV () SECURITYFOCUS COM]En nombre de Josh
Jaffe
Enviado el: Viernes 10 de Marzo de 2000 4:35 PM
Para: VULN-DEV () SECURITYFOCUS COM
Asunto: Re: How to Write Secure Code

At 10:45 AM 3/10/00 , Adam.Levine () BANKOFAMERICA COM wrote:
In addition to standards for writing secure code, I would be very
interested in
hearing about any tools that can be used to audit compliance with these
standards.  If you were going to audit an application where these
standards did
not exist, what would you use to sift through millions of lines of code to
identify exposures?

Thanks ... Adam

The best tool I know of for this sort of thing is a program called
'Discover'
by Software Emancipation Technology (www.setech.com).

I've used this tool on multi-million line projects, and it kicks ass.

-- Josh


Current thread: