Robin-David Hammond [EMAIL PROTECTED] wrote:
in any case MC hasnt been rigorously analysed for buffer-overrun
attacks afaik. Not only should you be cautious about using it for
sensitive data, but also on any virtual file system with sensative
or mission critical data, unless you are very
What are the security considerations in the following scenario?:
Suppose I have two MC apps running on different machines, and they
communicate with each other showing a listing of files each machine has
designated specifically for sharing (much like Napster, GNUtella clients,
etc.).
In this
e) use PGP (or
equivalent) signed packets of data, and a public key encryption scheme.
From: Richard Gaskin [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
Date: Thu, 12 Apr 2001 00:31:54 -0700
To: [EMAIL PROTECTED]
Subject: TCP/IP security considerations
What are the security cons
--- Richard Gaskin [EMAIL PROTECTED]
inquired about peer-to-peer security a la Metacard:
Any business peer-to-peer program will be compared to
Ray Ozzie's Groove, found at www.groove.net, because
he has a PR machine that just won't quit. Security is
fundamental to their efforts, so it might be