Yep. Using TLS, it's the classic way.
I know, I know...
Good point. Actually, a next article is following soon, as other guys said,
some stuff is lacking, bound exports, forwarding and so on. I did not forget
to mention that, it's just because I intended to talk about that elsewhere
;o). In fact, these are only short texts, nothing exhaustive. See these
articles as introductory texts. The aim is to interest people in debugging,
"white" hacking, etc. Hence, it's somehow incomplete. If I had to be very
very accurate, texts would be too long and only a few "hackers" should be
interested. Well, it's a step-by-step trap :o).
Lol, good point. As I said above, these are my first attemps to "teach"
something useful to others. I'm still looking for the good balance. It's not
that easy to decide where to give a figure, where not, what to detail, etc.
Furthermore I want a kind of gradual set of texts. Then, posts like yours
are very helpful to me because I can improve all that stuff. You know, I got
6,5 Kpages view since the beginning of the site 3 months ago... but only 2
mails!!! Peole are used to take, not to help. Well, when you have got no
feedback, it's pretty hard to improve :o).
So, great thanks.