Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. 3 pages may explain security better than anything

3 pages may explain security better than anything

Scheduled Pinned Locked Moved The Insider News
securityarchitecture
3 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R Offline
    R Offline
    raddevus
    wrote on last edited by
    #1

    From Ken Thompson[^] at his Turing Award Lecture in August 1984. This short lecture (3 pages) may explain why it is virtually impossible to secure systems. [-- Includes C code examples and is very short but the author really makes a solid point. --] Especially interesting in this time of open-source. Reflections on Trusting Trust[^] (acm.org is Association for Computing Machinery)

    subtitle

    To what extent should one trust a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.

    C 1 Reply Last reply
    0
    • R raddevus

      From Ken Thompson[^] at his Turing Award Lecture in August 1984. This short lecture (3 pages) may explain why it is virtually impossible to secure systems. [-- Includes C code examples and is very short but the author really makes a solid point. --] Especially interesting in this time of open-source. Reflections on Trusting Trust[^] (acm.org is Association for Computing Machinery)

      subtitle

      To what extent should one trust a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.

      C Offline
      C Offline
      Chris Maunder
      wrote on last edited by
      #2

      Is it just me or are the figures in that paper numbered incorrectly?

      cheers Chris Maunder

      M 1 Reply Last reply
      0
      • C Chris Maunder

        Is it just me or are the figures in that paper numbered incorrectly?

        cheers Chris Maunder

        M Offline
        M Offline
        Marc Clifton
        wrote on last edited by
        #3

        Chris Maunder wrote:

        Is it just me or are the figures in that paper numbered incorrectly?

        Security breach! Trojan horse! :laugh:

        Latest Articles:
        DivWindow: Size, drag, minimize, and maximize floating windows with layout persistence

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups