Securing embedded real-time software

There are many different ways to add security to software, but there is more to it than meets the eye.

Send this story to:

Enter the email address of the recipient.
Separate multiple addresses with commas.

Add your own personal message:

Enter your email address:

Note: Your email address is used only to let the recipient know who sent the story, and in case of transmission error. Both your address and the recipient's address will not be used for any other purpose.