IT Security
Every security fix released to correct weaknesses in computer programs should include a vulnerability simulator and exploit attempt reporting mechanism. A hacker shouldn't be able to know from the results of a probe if your system is truely vulnerable, or a honeypot connected to a law enforcement database. Simple.
0 Comments:
Post a Comment
<< Home