Beefy Boxes and Bandwidth Generously Provided by pair Networks
go ahead... be a heretic

Re: Hacker Proofing My Script

by hardburn (Abbot)
on Oct 04, 2004 at 20:29 UTC ( #396378=note: print w/replies, xml ) Need Help??

in reply to Hacker Proofing My Script

Frankly, if you're asking a question like "is this program hacker-proof", you've already lost. What you should always focus on is specific attacks (which you did in the body, e.g., "limit on post to prevent buffer overflows" and "secure from SQL injection"). The general statement of "is this program secure?" made in the title is far too naive to be useful.

Here's a great example of securing an application, this one involving ATMs: Notice how very specific requirements are made ("an attacker must take the PIN pad home and spend at least 10 hours breaking it").

"There is no shame in being self-taught, only in not trying to learn in the first place." -- Atrus, Myst: The Book of D'ni.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://396378]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others pondering the Monastery: (5)
As of 2020-01-23 19:18 GMT
Find Nodes?
    Voting Booth?