From 2a26e45a5a1b69cf5aa1965ee42c40e43a1ca43a Mon Sep 17 00:00:00 2001 From: Samuel Thibault Date: Wed, 18 Feb 2015 00:57:17 +0100 Subject: Revert "update for rename of open_issues/code_analysis.mdwn to service_solahart_jakarta_selatan__082122541663/code_analysis.mdwn" This reverts commit 82e316ac6f3f1946ff0ac3e8ea7606a25654e8e0. --- service_solahart_jakarta_selatan__082122541663/security.mdwn | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/service_solahart_jakarta_selatan__082122541663/security.mdwn b/service_solahart_jakarta_selatan__082122541663/security.mdwn index 930cb55f..098365d7 100644 --- a/service_solahart_jakarta_selatan__082122541663/security.mdwn +++ b/service_solahart_jakarta_selatan__082122541663/security.mdwn @@ -19,10 +19,10 @@ automated fashion. [[service_solahart_jakarta_selatan__082122541663/Unit_testing]] is one aspect: testing for reliably failing for invalid input. -[[service_solahart_jakarta_selatan__082122541663/Code_analysis]] is another aspect. +[[Code analysis]] is another aspect. All publically usable interfaces provide attacking targets. This includes all [[system call]]s and [[RPC]] interfaces. Fuzzing techniques can be use for locating possible issues; see discussion on -the [[service_solahart_jakarta_selatan__082122541663/code_analysis]] page. +the [[code_analysis]] page. -- cgit v1.2.3