Linked by Hadrien Grasland on Thu 20th Jan 2011 21:16 UTC
Privacy, Security, Encryption "In 2010, exploited Java vulnerabilities outpaced the exploit of Adobe Reader and Acrobat," Landesman, senior security researcher at Cisco, said. "Java was 3.5 times more frequently exploited than were malicious PDFs. That really spells out the need for paying attention to what's making the headlines but also paying attention to the types of things that aren't making the headlines."
Thread beginning with comment 459361
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[7]: update java
by moondevil on Fri 21st Jan 2011 20:28 UTC in reply to "RE[6]: update java"
moondevil
Member since:
2005-07-08

Well, if you implemented the JVM in a "safer" language like Java, how the hell would it run ? ;)


Actually it has already been done:
http://wikis.sun.com/display/MaxineVM/Home;jsessionid=383E286046FA9...

Still, there are lots of safe languages to choose from in the TIOBE top 50. I did not say that the JVM had to be coded in Java.

Besides, C(++) can be secure, when people know what they're doing with it (e.g. don't use scanf and char* apart for very low-level stuff where they can't do otherwise, think of the "delete" as soon as they've written a "new" somewhere, things like that)


I hear this excuse a lot, the problem is that it does not work in the real world. Contrary to what you may think, I do know C and C++ pretty well, and I also do have the experience what means to have multi-site development across the globe in such languages in the corporate world.

The result is not always pretty, there are tons of developers that should have never been allowed to touch C or C++, but they were.

Reply Parent Score: 2