On Thu, 15 Dec 2005, Kenneth R. van Wyk wrote:
The article's premise is that, because attackers can find out a great
deal about the internals of databases and such by decompiling bytecode
(in Java and .NET), bytecode should be obfuscated to hide its internal
details. The article points to
On Thursday 15 December 2005 09:26, Jose Nazario wrote:
if the person can develop exploits against the holes in the code, what
makes you think they can't fire up a runtime debugger and trace the code
execution and discover the same things?
Nothing makes me think that at all; in fact, I was