At 3:10 PM -0800 1/22/07, Blue Boar wrote:
> ljknews wrote:
>> Analyzing source code is independent of machine architecture.
>> 
>> My guess is that if a company actually is capable of analyzing
>> binary code they only do it for the highest volume instruction
>> sets.
>> 
>> My guess is that attackers will go after machines they feel are
>> less protected.
>> 
>> Efforts which merely change attacker behavior are a waste of time.
> 
> Nope. If I'm running x86 boxes, I'd be more than happy to have to
> attackers move to SPARC.

Those of us _not_ running X86 do not feel that way.
-- 
Larry Kilgallen
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to