e.stiebler wrote:
Don wrote:
[I'm intensely interested in this as to how
it can be done
to make applications in consumer devices "hacker hardened"]
Run VMS ;-)
Bt, is that truly "hacker proof" or "hardened by obscurity"? :>
hacker proof. Just google for "vms defcon 9"