tailieunhanh - stealing the network how to own the box PHẦN 10
Cuối cùng, họ phát triển các thiết lập của riêng của họ trong những điều buồn cười tùy chỉnh mà họ có thể không nhận ra rằng các tùy chỉnh nhiều hơn các công cụ và tinh tế hơn của họ các kỹ thuật, nó dễ dàng hơn cho tôi để hồ sơ cá nhân họ. | 276 Appendix The Laws of Security I m sure there will be someday. A couple of past attacks have certainly indicated that such buffer overflows exist. Another way to handle the exchange is through the use of SSL and your browser. In the normal exchange of information if you weren t asked for any information then the crypto must be broken. How then does SSL work When you go to a secure Web page you don t have to provide anything. Does that mean SSL is a scam No a piece of information has indeed been shared the root certificate authority s public you download browser software it comes with several certificates already embedded in the certificates constitute the bit of information required to makes things secure. Yes there was an opportunity for a MITM attack when you downloaded the file. If someone were to muck with the file while it was on the server you downloaded it from or while it was in transit to your computer all your SSL traffic could theoretically be compromised. SSL is particularly interesting as it s one of the best implementations of massmarket crypto as far as handling keys and such. Of course it is not without its problems. If you re interested in the technical details of how SSL works check here standards ssl . Malicious Code Cannot Be 100 Percent Protected against During the last couple of years we have seen more and more attacks using weaknesses in operating systems and application code to gain entrance to our systems. Recently we ve seen a number of programs that were quickly modified and redeployed on the Internet and have resulted in widespread disruption of service and loss of is this It is because we can t protect 100 percent against malicious code when it changes as rapidly as it does now. We ll take a look at some examples of this in the following section and discuss the anti-virus protection process as an example. If like most people you run a Windows-based operating system .
đang nạp các trang xem trước