Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Mr. K

But then don’t you need to physically have that software to forensically analyze it?

I don’t even know if that question makes sense :)


12 posted on 11/27/2020 3:15:17 PM PST by dp0622 (Tried a coup, a fake tax story, tramp slander, Russia nonsense, impeachment and a virus. They lost.)
[ Post Reply | Private Reply | To 10 | View Replies ]


To: dp0622

Source code is like a text document. There can be many copies of it, but when you build it it becomes an executable file.

If you want to have a secure system you must match source code to executable file. You do that by building the source code and creating a checksum.

Once you build it to be released and used, you cannot change it. If you do change it, it will not build and create the same checksum anymore.

Every machine that was used should be tested to see if the executable code checksum (fingerprint) matches. If it doesn’t then somebody put different code on that machine.


17 posted on 11/27/2020 3:38:28 PM PST by Mr. K (No consequence of repealing obamacare is worse than obamacare itself)
[ Post Reply | Private Reply | To 12 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson