Defensive programming: Difference between revisions

Content deleted Content added
Note that the techniques below are ''not'' sufficient to ensure security: see the articles computer security, computer insecurity and secure computing for more information.
-/Talk
Line 31:
name of this file, like "/etc/../etc/passwd".
 
[[talk:Secure_coding_practice|/Talk]]