
■
Place all software under revision control.
■
Do not treat the preceding recommendations as too costly or time con-
suming. Consider the cost of having an outside consultant (whose rate is
never less than hundreds of dollars per hour) doing as much for you.
Exploiting Inherent Weaknesses in
Code or Programming Environments
As with any human endeavor, there are those who pursue their goals with greater
ambition than most people. In this respect, the highly skilled intruder is no different.
Not simply satisfied to have taken advantage of vulnerable services through common
exploits or tricking others into divulging useful information about your site, this ...