User: Password:
|
|
Subscribe / Log in / New account

The Integrity Measurement Architecture

The Integrity Measurement Architecture

Posted Jun 3, 2005 3:24 UTC (Fri) by gouyou (guest, #30290)
Parent article: The Integrity Measurement Architecture

So an attacker can easly review which version of the software I'm running check the vulnerability database and launch the proper attack without having to guess or try them all ...

Great step forward for securing servers ...

And the next weak point will probably the hash database.


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds