From 82e316ac6f3f1946ff0ac3e8ea7606a25654e8e0 Mon Sep 17 00:00:00 2001 From: "https://me.yahoo.com/a/g3Ccalpj0NhN566pHbUl6i9QF0QEkrhlfPM-#b1c14" Date: Mon, 16 Feb 2015 20:12:25 +0100 Subject: update for rename of open_issues/code_analysis.mdwn to service_solahart_jakarta_selatan__082122541663/code_analysis.mdwn --- service_solahart_jakarta_selatan__082122541663/security.mdwn | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/service_solahart_jakarta_selatan__082122541663/security.mdwn b/service_solahart_jakarta_selatan__082122541663/security.mdwn index 098365d7..930cb55f 100644 --- a/service_solahart_jakarta_selatan__082122541663/security.mdwn +++ b/service_solahart_jakarta_selatan__082122541663/security.mdwn @@ -19,10 +19,10 @@ automated fashion. [[service_solahart_jakarta_selatan__082122541663/Unit_testing]] is one aspect: testing for reliably failing for invalid input. -[[Code analysis]] is another aspect. +[[service_solahart_jakarta_selatan__082122541663/Code_analysis]] is another aspect. All publically usable interfaces provide attacking targets. This includes all [[system call]]s and [[RPC]] interfaces. Fuzzing techniques can be use for locating possible issues; see discussion on -the [[code_analysis]] page. +the [[service_solahart_jakarta_selatan__082122541663/code_analysis]] page. -- cgit v1.2.3