home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!stan!not-for-mail
- From: imp@solbourne.com (Warner Losh)
- Newsgroups: alt.security
- Subject: Re: A Solicitation for Opinions
- Date: 5 Nov 1992 11:19:21 -0700
- Organization: ParcPlace Boulder
- Lines: 17
- Message-ID: <1dboj9INN4q1@kolvir.solbourne.com>
- References: <Bx6oLy.L7z@minerva1.bull.it> <1992Nov4.153248.12490@ulysses.att.com> <6183@tuegate.tue.nl>
- NNTP-Posting-Host: kolvir.solbourne.com
-
- In article <6183@tuegate.tue.nl> johan@blade.stack.urc.tue.nl (Johan
- Wevers) writes:
- >Most security holes are just overlooked by experts, but they're
- >certainly capable to see wether[sic] something is a hole or not when
- >they're pointed at.
-
- I am not a security expert. Many times when talking with someone I
- ask them why they didn't do something this way rather than that. They
- usually say something about "security hole." Most of the time, I see
- what they mean right away. Sometimes I have to ask for more info to
- discover the hole. Most holes are very obvious to someone who is
- looking for them, but not so obvious to most programmers.
-
- Warner
- --
- Warner Losh imp@parcplace.COM ParcPlace Boulder
- I've almost finished my brute force solution to subtlety.
-