Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission + - How can you spot secure software at a distance? (

nickh01uk writes: "Independent security researchers have compiled a list of their most frequently recommended security infrastructure components, drawn out the common threads that each shares, and attempt to answer the question "What makes this software so uncommonly good?". They then use this knowledge to put forward a straw-man for evaluating future tools and software for use in secure environments. Not everyone will agree with their choices, but many will appreciate the conclusions."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

How can you spot secure software at a distance?

Comments Filter:

No problem is so formidable that you can't just walk away from it. -- C. Schulz