3 pages may explain security better than anything
-
From Ken Thompson[^] at his Turing Award Lecture in August 1984. This short lecture (3 pages) may explain why it is virtually impossible to secure systems. [-- Includes C code examples and is very short but the author really makes a solid point. --] Especially interesting in this time of open-source. Reflections on Trusting Trust[^] (acm.org is Association for Computing Machinery)
subtitle
To what extent should one trust a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.
-
From Ken Thompson[^] at his Turing Award Lecture in August 1984. This short lecture (3 pages) may explain why it is virtually impossible to secure systems. [-- Includes C code examples and is very short but the author really makes a solid point. --] Especially interesting in this time of open-source. Reflections on Trusting Trust[^] (acm.org is Association for Computing Machinery)
subtitle
To what extent should one trust a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.
Is it just me or are the figures in that paper numbered incorrectly?
cheers Chris Maunder
-
Is it just me or are the figures in that paper numbered incorrectly?
cheers Chris Maunder
Chris Maunder wrote:
Is it just me or are the figures in that paper numbered incorrectly?
Security breach! Trojan horse! :laugh:
Latest Articles:
DivWindow: Size, drag, minimize, and maximize floating windows with layout persistence