Author: | Edward E. Rochon | ISBN: | 9781370113262 |
Publisher: | Edward E. Rochon | Publication: | January 11, 2017 |
Imprint: | Smashwords Edition | Language: | English |
Author: | Edward E. Rochon |
ISBN: | 9781370113262 |
Publisher: | Edward E. Rochon |
Publication: | January 11, 2017 |
Imprint: | Smashwords Edition |
Language: | English |
A preface suggests we overshot the mark in cutting back on spaghetti programming. Chapter 1 explains why spaghetti programming is better at the micro-level for security, compactness of code. Chapter 2 pushes extremely precise note taking. using modern text editors. These are the key to large spaghetti code, locked away in safes, never online. Spaghetti code makes it tough for hackers, not easier. Offer some suggestions to take full advantage of text editors. Recommend dumping high level languages for programming (including C) and going back to machine language. Chapter 3 proposes some ideas that include OS suites, attaching specific OS programs to specific apps. Master Boot Records that trace source of all downloaded files, including URL's. removable media. Unique OS packages by random 256 key user inserted keys. Each Windows becomes unique, and hard for hackers to find tripwires that foil their dirty deeds. Some other security fixes mentioned.
A preface suggests we overshot the mark in cutting back on spaghetti programming. Chapter 1 explains why spaghetti programming is better at the micro-level for security, compactness of code. Chapter 2 pushes extremely precise note taking. using modern text editors. These are the key to large spaghetti code, locked away in safes, never online. Spaghetti code makes it tough for hackers, not easier. Offer some suggestions to take full advantage of text editors. Recommend dumping high level languages for programming (including C) and going back to machine language. Chapter 3 proposes some ideas that include OS suites, attaching specific OS programs to specific apps. Master Boot Records that trace source of all downloaded files, including URL's. removable media. Unique OS packages by random 256 key user inserted keys. Each Windows becomes unique, and hard for hackers to find tripwires that foil their dirty deeds. Some other security fixes mentioned.