Content deleted Content added
m Automated conversion |
Darius Bacon (talk | contribs) mNo edit summary |
||
Line 1:
Many of these techniques also improve general quality of code
▲in [[Denial of Service]] or other attack.
<i>Please expand this article. These random notes should be changed to a more coherent article.</i>
One of the the most common problems is
for dynamic-size data (the [[buffer overflow]] problem). This is especially
You should never use functions like <tt>
Never make your code more complex
Either leave your code available to everyone on the Net (see [[Free software]])
Line 27 ⟶ 25:
If you check data for correctness, check if it's correct, not if it is incorrect.
you checked if a requested file is not "/etc/passwd", a cracker might pass
name of this file, like "/etc/../etc/passwd".
|