web-security methods, advice please!

Sy Ali sy1234-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Mon Jan 1 02:52:01 UTC 2007


On 12/31/06, Madison Kelly <linux-5ZoueyuiTZhBDgjK7y7TUQ at public.gmane.org> wrote:
>    I am not a cryptologist (or particularly good at math) and make no
> claims to be a security expert of any kind. So please be brutal and
> honest with my plans (a cracker would)! :)
> <snip>
> Again, *Please* be brutal on your critiques of my methods. If my
> thinking is flawed, I would be grateful to learn now rather than later. :)

I'm not in a position of expertise, but i want to give you the very
first thing that lept to my mind..

Unless I'm missing something.. if you're not an expert, you shouldn't
play at being one when security is in question.

Having said that, is it possible for you to either contract this
portion of the coding out to an expert or either re-use or buy
existing, tested and trusted code for your own purposes?

At the very least, this helps you cover your behind..
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list