Talk:Exploit (computer security): Difference between revisions

Content deleted Content added
leave stock text alone - good way to filter out idiots
mNo edit summary
Line 1:
You've followed a link to a page that doesn't exist yet. If you'd
like to create a new page under this title, delete this message and
get typing! Click the 'Help' link up top if you haven't used a
Wiki before and aren't sure how to go about it.
 
If you didn't mean to create a new page, just click the 'back'
button in your browser, or use the search box at the top of the
screen to find existing articles.
 
An exploit may or may not 'extend privileges'. It could cicumvent access control, or entend it to provides or extends access to a feature _or_ allows a feature to be used in a manner not intended by the softwares developers.
 
:there are always such misfeatures, bugs, holes, whatever you wanna call 'em. It's best not to distinguish but imagine software itself as swiss cheese that one grabs onto by fumbling fingers in the dark, some of which give access to the center and let you grab the whole cheese, take it out of the dark, adn eat it.
 
---
I considered deleting the stock boilerplate text, but people too stupid to figure out why it's still there are too stupid to contribute to this thread.