This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Talk:Java leading security practice"

From OWASP
Jump to: navigation, search
(Threat model?)
 
(Moving proposal)
Line 2: Line 2:
  
 
What is the threat model behind these recommendations? Most of them don't seem to make sense to me because they can be bypassed in 5 minutes with a custom classloader, so I'm wondering what I'm missing. [[User:HenryAyoola|HenryAyoola]] 05:13, 10 February 2009 (EST)
 
What is the threat model behind these recommendations? Most of them don't seem to make sense to me because they can be bypassed in 5 minutes with a custom classloader, so I'm wondering what I'm missing. [[User:HenryAyoola|HenryAyoola]] 05:13, 10 February 2009 (EST)
 +
 +
== Article move proposal ==
 +
 +
I propose to rename this article from
 +
Java_leading_security_practice
 +
to
 +
Leading_Java_Security_Practice
 +
which uses the same title case as most other section titles in the Code Review Guide
 +
and uses a more natural adjective order (http://en.wikipedia.org/wiki/Adjective#Adjective_order). --[[User:Thomas Herlea|Thomas Herlea]] 12:17, 8 September 2010 (UTC)

Revision as of 12:17, 8 September 2010

Threat model?

What is the threat model behind these recommendations? Most of them don't seem to make sense to me because they can be bypassed in 5 minutes with a custom classloader, so I'm wondering what I'm missing. HenryAyoola 05:13, 10 February 2009 (EST)

Article move proposal

I propose to rename this article from

Java_leading_security_practice

to

Leading_Java_Security_Practice

which uses the same title case as most other section titles in the Code Review Guide and uses a more natural adjective order (http://en.wikipedia.org/wiki/Adjective#Adjective_order). --Thomas Herlea 12:17, 8 September 2010 (UTC)