At 3:10 PM -0800 1/22/07, Blue Boar wrote: > ljknews wrote: >> Analyzing source code is independent of machine architecture. >> >> My guess is that if a company actually is capable of analyzing >> binary code they only do it for the highest volume instruction >> sets. >> >> My guess is that attackers will go after machines they feel are >> less protected. >> >> Efforts which merely change attacker behavior are a waste of time. > > Nope. If I'm running x86 boxes, I'd be more than happy to have to > attackers move to SPARC.
Those of us _not_ running X86 do not feel that way. -- Larry Kilgallen _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________