(日期:][下一个日期][线程:][线程下][日期索引][线程索引]

再保险:v 5.3 (dcl)



合并变化也把吉姆的点通过删除引用是否商业工具,免费软件,或两者兼而有之——使得严格的写作。段落的最后一行更加具体——“软件”是模棱两可的。这个版本取代我之前的文章。后试图用perl编写一个重新,见鬼的格式。我们可以修复它,当我们完成。所有这些不同的邮件读者螺钉的事情太多了。>非常小的变化[]——一个引人注目的“next >的一代”,因为更古老的安全专家需要>教育,另一个添加‘授权’这个词>最后一段强调旁边。> > - - - - - - - - - - - >从原始信息:斯图亚特Staniford [mailto: stuart@SILICONDEFENSE.COM]>发送:星期三,2000年5月10日下午若>:cve-editorial-board-list@lists.mitre.org >主题:5.2 v (Stuart)格式> > >啊——这是重置后,网景的自动换行更多> > >安德烈的最后是伟大的。这是我有史以来最好的经验>协作>的写作。> >这是另一个版本非常小作家删除几>语法旁边。只有重大变化:> > *之后添加”和开源”“商业”软件。亲爱的<公约起草者>:专家、教育者、实践者的信息安全,我们希望注册我们的担忧欧洲理事会的条约草案犯罪在网络空间。定罪的部分提出条约可能导致技术和软件常用的计算机系统抗攻击。签署州通过立法来实现该条约危及安全的计算机系统。专业人员将无法充分保护计算机系统,信息保护和教育专家将受阻。保护计算机系统的关键和基础设施的能力测试软件漏洞,验证现有系统中存在的漏洞,漏洞信息交换。专业人士和公司日常开发、使用和共享软件旨在利用漏洞。 Various tools for system administrators and security experts include software that exploits vulnerabilities. Academic institutions use software designed to exploit vulnerabilities to educate students and in research to develop and improve defenses. Our experience suggests that it is impossible to reliably distinguish software used in computer crime from that used for legitimate purposes. Article 6 of the treaty is vague regarding the use, distribution, or possession of software that could be used to violate the security of computer systems. Legislation that criminalizes exploit software use would adversely impact security practitioners, researchers, and educators. Article 6 would throttle important progress in computer security research and engineering. We agree that breaking into computer systems is wrong and are strongly in favor of criminalizing inappropriate behavior. Our goal is for the treaty and resulting legislation to permit the development and application of good security measures. We urge the Council to avoid criminalizing the development, authorized use, and distribution of software important to those of us working to prevent misuse. We request that the treaty drafters specifically recognize legitimate computer security activities and permit the creation and public dissemination of software and techniques used to study and verify computer security vulnerabilities. Moreover, we urge that appropriate laws criminalizing software misuse replace the ownership or creation clauses of the treaty. Signed,   "Organizational affiliations are listed for identification purposes only, and do not necessarily reflect the official opinion of the affiliated organization."

页面最后更新或审查:2007年5月22日,