When I was working at @stake in the early 2000s, most of my client engagements were in application security. I did a number of code reviews that actually involved people handing me stacks of paper to go through. ‘Grep’ was an important security tool. When I was involved in application penetration tests, we used a […]
↧