Re: Beat the UIGEA from the bottom up
[ QUOTE ]
Use an SHA checksum or whatever to check the executable is legit.. but a decent system should not be scared of revealing source code, and should do so whenever possible. If errors are found, sweet [img]/images/graemlins/smile.gif[/img] fix it!
dave.
[/ QUOTE ]
So who's going to check these hashes?
Edit: also checking clients is going to be a waste of time, since they're not going to be receiving any exploitable data in a well-designed (and non-rigged) system. Checking servers is what I'm talking about.
|