Jump to content

Talk:Exploit (computer security)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Fubar Obfusco (talk | contribs) at 14:29, 18 August 2004 (Propose moving to exploit (computer security), since this isn't a computer science term). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

An exploit may or may not 'extend privileges'. It could cicumvent access control, or entend it to provide or extends access to a feature _or_ allows a feature to be used in a manner not intended by the softwares developers.

there are always such misfeatures, bugs, holes, whatever you wanna call 'em. It's best not to distinguish but imagine software itself as swiss cheese that one grabs onto by fumbling fingers in the dark, some of which give access to the center and let you grab the whole cheese, take it out of the dark, adn eat it.

This is supposed to be an encyclopedia, its whole premises is centered on completeness and accuracy.

This is not computer science

The term "exploit" as defined here is not a computer science term. It is a term from computer security operations. I propose that this article be moved to Exploit (computer security). Any objections? --FOo 14:29, 18 Aug 2004 (UTC)