Summary


This chapter is not intended to make you safe. It is intended to help you find easy exploits to prove that something is unsafe. It is very important to realize, however, that even if you do not find anything that looks suspicious when you perform your investigation, the software may still be flawed. Software security is an extremely complicated and large field, and experts spend years becoming adept at evaluating software security. In other words, this is truly the unicorn chapter. You can use the techniques to prove that something is unsafe, but not that it is safe. If you want to become an expert in that field, read How to Break Software Security (Addison-Wesley, 2003), How to Break Software: A Practical Guide to Testing (Addison-Wesley, 2002), or Exploiting Software: How to Break Code (Addison-Wesley, 2004).



Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net