Within the functions of how to fine-tune in our times it is essential to test if what we have done is "penetrable" by any person or program that may find that we have programmed or we have used software with vulnerabilities that allow the attacker to enter and execute code malicious or simply turn our system into a robot that accepts and executes what those people or programs want to do, from using us to send spam mail to encrypting our files and asking us for a reward to release them.

That is why it is important that, from the beginning, in our first conceptions and Brain Graphs, we take into account that we must and have to test our program or system for vulnerabilities, and that we must even be ready to manually or program update any source code or library that we have used and that report that they have found vulnerabilities.

To continue reading please click here.

Pin It

No thoughts on “06. Fine-tune. Part Six.”

Leave your comment

In reply to Some User