To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Anti-Subversion Software

From Wikipedia, the free encyclopedia

Software subversion is the process of making software perform unintended actions either by tampering with program code or by altering behavior in another fashion. For example, code tampering could be used to change program code to load malicious rules or heuristics, SQL injection is a form of subversion for the purpose of data corruption or theft[1] and buffer overflows[2] are a form of subversion for the purpose of unauthorised access. These attacks are examples of computer hacking.

Anti-Subversion Software detects subversion and attempts to stop the effects of the hack. Software applications are vulnerable to the effects of subversion throughout their lifecycle from development to deployment, but particularly in operation and maintenance.[3]

Anti-subversion protection can be accomplished in both a static and dynamic manner:

  • Static anti-subversion is performed during the construction of the code. The code is statically tested and verified against various attack types by examining the program source code. Examples of static anti-subversion include security auditing, code verification, and fuzzing. Static anti-subversion is generally seen as a good coding practice, and is deemed necessary in some compliance regimes. However, static solutions cannot prevent all types of subversion attacks.
  • Dynamic anti-subversion is performed during code execution. The code is dynamically protected against subversion by continuously checking for unintended program behaviours. Examples of dynamic anti-subversion include application firewalls, security wrappers, and protection embedded in the software.[4]

Software applications running on desktops, corporate servers, mobile devices and embedded devices are all at risk from subversion.[5]

References

  1. ^ "Business Insights and Resources" (PDF).
  2. ^ Glynn, Fergal (2012-04-19). "On Buffer Overrun Vulnerabilities, Exploits and Attacks". Infosec Island. Archived from the original on 2020-01-03.
  3. ^ "Build Security in | CISA".
  4. ^ Metaforic[circular reference]
  5. ^ "Security in the Age of Mobility" (PDF). Trend Micro. 2012. Archived from the original (PDF) on 2012-08-19.
This page was last edited on 22 September 2023, at 17:37
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.