SEE http://auditnet.org/
-Original Message-
From: Steven M. Christey [mailto:[EMAIL PROTECTED]
Sent: Tuesday, May 04, 2004 1:50 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Vulnerability Auditing Checklist
>Maybe Steven have a newer version available?
U
Hey guys,
SD Mag is doing a webinar thing tomorrow with Bruce. If you ever
wondered why people in dev think about security the way they do, drop in
and see what kind of stuff we tend to tell them! Participate. Raise
the bar. Etc.
I have no idea what sort of hoop jumping is required for regist
>Maybe Steven have a newer version available?
Unfortunately, I haven't been able to do a major overhaul, or to
refine the categories.
>Would be nice with some illustrations to each vulnerability listed.
Below is an updated version. There are some more sub-categories, and
now most categories ha
Crispin Cowan wrote:
> Ok, someone has mentioned Ken Thompson's Turing Award speech in a "my
> security is better than yours" flamewar^W discussion. This almost
> warrants a security-geek version of Godwin's law :)
That's fine. I didn't bring it up, the original article did. I still do
think