This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
ci2010:team2_securing_software [2010/02/17 16:06] ablejde |
ci2010:team2_securing_software [2010/02/17 16:09] ablejde |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | The current approach to securing software is an incredibly self-destructive approach seemingly to someone from the outside. Instead of working to secure software, security researchers work to break software and then post the exploits publicly. This approach, while having some advantages, is ultimately dangerously flawed. | + | =====Internet Security Tips===== |
+ | [[ci2010:team2|back]] | ||
+ | The current approach to securing software is an incredibly self-destructive | ||
+ | approach seemingly to someone from the outside. Instead of working to secure | ||
+ | software, security researchers work to break software and then post the exploits | ||
+ | publicly. This approach, while having some advantages, is ultimately dangerously flawed. | ||
| | ||
| | ||