Quote:
Originally Posted by Richard
Some interesting concepts here...but it sometimes makes me wonder about our openness regarding such matters.
|
Perhaps we should be even more open.
The knowledge mentioned in the article is available in undergraduate computer science programs. At a certain university, a junior-level course in the subject was created, and it included specific details of how to do the various attacks - and assignments to use specific network attacks were conducted on an isolated network. I don't think that anyone who wants to know the material is prevented from learning it - from both the offensive and defensive perspectives.