On Fri, 18 Aug 2006, e.stiebler wrote:
[I'm
intensely interested in this as to how it can be done
to make applications in consumer devices "hacker hardened"]
Run VMS ;-)
Bt, is that truly "hacker proof" or "hardened by obscurity"? :>
hacker proof. Just google for "vms defcon 9"
The fact that no-one at defcon 9 knows VMS well enough to break into a VMS
box says nothing of the security of VMS; it only says something about it's
popularity.
Alexey