{"id":1126,"date":"2003-03-24T07:04:58","date_gmt":"2003-03-24T06:04:58","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=1126"},"modified":"2003-03-24T07:04:58","modified_gmt":"2003-03-24T06:04:58","slug":"microsoft-encourage-des-universites-a-enseigner-le-piratage","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=1126","title":{"rendered":"Microsoft encourage des universit\u00e9s \u00e0 enseigner le piratage"},"content":{"rendered":"<p class=\"post_excerpt\">Microsoft travaille de concert avec une universit\u00e9 britannique afin d&rsquo;enseigner aux \u00e9tudiants des notions de piratage et surtout la fa\u00e7on de programmer des logiciels s\u00e9curitaires. <\/p>\n<p>L&rsquo;Universit\u00e9 de Leeds en Grande-Bretagne est la premi\u00e8re \u00e0 offrir un module de 11 semaines, destin\u00e9 aux \u00e9tudiants en informatique du premier cycle et commandit\u00e9 en partie par Microsoft, au cours duquel ils devront, dans un premier temps, tenter de craquer la s\u00e9curit\u00e9 d&rsquo;un syst\u00e8me et, dans un second temps, colmater les br\u00e8ches afin de le rendre s\u00e9curitaire.<\/p>\n<p>Le but de l&rsquo;op\u00e9ration est \u00e9videmment d&rsquo;apprendre aux \u00e9tudiants, qui seront les programmeurs de demain, \u00e0 concevoir des logiciels stables et s\u00e9curitaires. C&rsquo;est dans le cadre de sa philosophie de l&rsquo;informatique digne de confiance (\u00abTrustworthy Computing\u00bb) que Microsoft participe \u00e0 ce type de programme.<\/p>\n<p>Selon Nick Efford, professeur en informatique \u00e0 l&rsquo;Universit\u00e9 de Leeds, m\u00eame si Microsoft est commanditaire de ce module, cela ne signifie pas que l&rsquo;\u00e9tude sera limit\u00e9e \u00e0 l&rsquo;utilisation de ses logiciels ; les \u00e9tudiants ont \u00e9videmment besoin d&rsquo;une formation beaucoup plus large, particuli\u00e8rement au premier cycle. <\/p>\n<p>[source &#8211; branchez-vous.com]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft travaille de concert avec une universit\u00e9 britannique afin d&rsquo;enseigner aux \u00e9tudiants des notions de piratage et surtout la fa\u00e7on de programmer des logiciels s\u00e9curitaires. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-1126","post","type-post","status-publish","format-standard","hentry","category-hackers"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/1126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1126"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/1126\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}