This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
ci2010:team2_securing_software [2010/02/17 16:07] ablejde |
ci2010:team2_securing_software [2010/02/17 16:09] ablejde |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | The current approach to securing software is an incredibly self-destructive | + | =====Internet Security Tips===== |
+ | [[ci2010:team2|back]] | ||
+ | The current approach to securing software is an incredibly self-destructive | ||
approach seemingly to someone from the outside. Instead of working to secure | approach seemingly to someone from the outside. Instead of working to secure | ||
- | software, security researchers work to break software and then post the exploits | + | software, security researchers work to break software and then post the exploits |
- | publicly. This approach, while having some advantages, is ultimately dangerously flawed. | + | publicly. This approach, while having some advantages, is ultimately dangerously flawed. |
| | ||
| | ||