Jump to content

Talk:Exploit (computer security)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Fubar Obfusco (talk | contribs) at 04:24, 4 February 2005 (This is not computer science: Moved, since nobody objected since August). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

An exploit may or may not 'extend privileges'. It could cicumvent access control, or entend it to provide or extends access to a feature _or_ allows a feature to be used in a manner not intended by the softwares developers.

there are always such misfeatures, bugs, holes, whatever you wanna call 'em. It's best not to distinguish but imagine software itself as swiss cheese that one grabs onto by fumbling fingers in the dark, some of which give access to the center and let you grab the whole cheese, take it out of the dark, adn eat it.

This is supposed to be an encyclopedia, its whole premises is centered on completeness and accuracy.

This is not computer science

The term "exploit" as defined here is not a computer science term. It is a term from computer security operations. I propose that this article be moved to Exploit (computer security). Any objections? --FOo 14:29, 18 Aug 2004 (UTC)

Well, nobody objected in a few months, so moved it is. --FOo 04:24, 4 Feb 2005 (UTC)