Author: JT Smith
From Help Net Security: “There exists a possibility for an attacker to embed special modelines into a text file which when opened with vim could compromise the account of the user.”
Category:
- Linux
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
“Review is boring and time consuming, and it’s hard,” said Steve Lipner, manager
of Microsoft’s security response center. “Simply putting the source code out there
and telling folks ‘here it is’ doesn’t provide any assurance or degree of likelihood
that the review will occur.”
Author: JT Smith
Category: