From mboxrd@z Thu Jan 1 00:00:00 1970 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "J-P. Rosen" Newsgroups: fr.comp.lang.ada,comp.lang.ada Subject: Re: Canal+ crash Date: Sun, 21 Jul 2024 11:10:06 +0200 Organization: Adalog Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sun, 21 Jul 2024 11:09:57 +0200 (CEST) Injection-Info: dont-email.me; posting-host="d589419006eb02117f6627a0822d6004"; logging-data="44808"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/GvKZ2qrWH+9hlYzRyqbl3" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:Pe8OPlUD3PuKunUWGKwDTQC6MgU= In-Reply-To: Content-Language: en-US, fr Xref: news.eternal-september.org fr.comp.lang.ada:2290 comp.lang.ada:66234 List-Id: Le 21/07/2024 à 10:00, Niklas Holsti a écrit : > But certainly, most attacks on SW have used functional bugs such as > buffer overflows. A problem that has been solved since 1983, and even before (Pascal had bounds checking). Sigh... -- J-P. Rosen Adalog 2 rue du Docteur Lombard, 92441 Issy-les-Moulineaux CEDEX https://www.adalog.fr https://www.adacontrol.fr