Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats .e from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This short.ing can be a matter of design, code realization of the problem. Different perspective of security loopholes In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apache, etc. loopholes. 2. Data from the perspective include : ● could not reasonably be read and read data, including the memory of the data, documents the data, Users input data, the data in the database, network, data transmission and so on. ● designated can be written into the designated places (including the local paper, memory, databases, etc.) ● Input data can be implemented (including native implementation, according to Shell code execution, by SQL code execution, etc.) 3. From the point of view...