Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - How can you spot secure software at a distance?->

Submitted by
nickh01uk
nickh01uk writes "Independent security researchers have compiled a list of their most frequently recommended security infrastructure components, drawn out the common threads that each shares, and attempt to answer the question "What makes this software so uncommonly good?". They then use this knowledge to put forward a straw-man for evaluating future tools and software for use in secure environments. Not everyone will agree with their choices, but many will appreciate the conclusions."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

How can you spot secure software at a distance?

Comments Filter:

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...