3 | | Before creating a BOINC project, read about [http://boinc.berkeley.edu/security.php security issues in volunteer computing]. BOINC provides mechanisms that address the major issues, making volunteer computing safe both for you and for participants. '''If you don't use these mechanisms correctly, |
4 | | your project will be vulnerable to a variety of attacks. |
5 | | In the worst case, your project could be used as a vector |
6 | | to distribute malicious software to large numbers of computers. |
7 | | This would be fatal to your project, |
8 | | and would cause serious damage to volunteer computing in general. |
9 | | ''' |
| 3 | Before creating a BOINC project, read about [http://boinc.berkeley.edu/security.php security issues in volunteer computing]. BOINC provides mechanisms that address the major issues, making volunteer computing safe both for you and for participants. |
| 4 | |
| 5 | '''If you don't use these mechanisms correctly, your project will be vulnerable to a variety of attacks. In the worst case, your project could be used as a vector to distribute malicious software to large numbers of computers. This would be fatal to your project, and would cause serious damage to volunteer computing in general.''' |