Talk:Hacking: The Art of Exploitation Second Edition

Peer Review
This article was very interesting! I honestly have no clue how to do any of the things mentioned, but it made me want to get the book and try it out. There are a few problems with the article, probably because it was just put up, but I'm going to just go ahead and say them anyway so you have a start on where to go. Overall I liked the information in the article, just some small fixes to be made, but I thought it was very interesting! Megzie113 (talk) 12:39, 22 April 2010 (UTC)
 * First, you need a lead at the top of the page that gives a breif description of the entire article.
 * Also there are many sections of the article with only 2-3 sentences in them, try and expand these to maybe 4-5?
 * The first paragraph is kind of choppy, try to switch up the sentence structure.
 * Add citations (Im guessing you just did't get to this yet)
 * Maybe add a section that deals just with the author ? Just if you have time.

Hybrid Ciphers
This section makes the following statement: "The speed and efficiency of a hybrid cipher is much better than that of a symmetric or asymmetric cipher". This isn't true. It can't possibly be faster than a symmetic cipher as the point of hybrid ciphers is to use an asymmetric cipher to establish a session key for symmetric encryption. Excluding the overhead of establishing the session key, it is equal. (129.12.102.161 (talk) 16:00, 13 May 2011 (UTC))

Blatant errors in "Assembly vs. C"
The "Assembly vs. C" section is just wrong. Totally. — Preceding unsigned comment added by 77.12.117.148 (talk) 21:19, 23 March 2012 (UTC)