Tag: programming


Found 60 results for 'programming'.


1) bash - How to get into python environment and run some python commands and return to normal terminal using shell script
2) bash - The $@ variable is not working in a for loop, trying to iterate through a users list
3) confidentiality - Timing Safe String Comparison - Avoiding Length Leak
4) cryptography - Deploy verifiable webapp source code
5) shell - Remove null variable name and value both while echoing in a single string
6) cryptography - Simple string comparisons not secure against timing attacks
7) attacks - Does preventing buffer overflow attacks prevent ROP attacks?
8) threat-mitigation - Are there "secure" languages?
9) programming - Using OpenSSL as a library versus calling output from standalone command in a program being written
10) windows - Auditing EXEs to ensure buffer overflow protections are in place? (such as SEHOP, ASLR, and DEP)
11) bash - How complex can a program be written in pure Bash?
12) linux - Ensuring only 1 mandatory parameter is passed to script
13) attack-prevention - Can the sandboxing technique prevent a buffer overflow attack?
14) command-line - Keeping program GUI front-end and CLI functionality separate
15) attack-prevention - Why must all classes' data members be set to private?
16) malware - Sealed Room Security - Possibility of writing assembled binary code
17) software-installation - How to install Scala?
18) cryptography - Implementation language for crypto
19) programming - How should I write a test environment for my program?
20) trusted-computing - Which PCR we can extend by using our own code?
21) cryptography - Crypto software: overwrite sensitive buffer
22) memory - Would the Cloudbleed have been prevented if Rust was used?
23) passwords - How can hackers get 1 billion passwords per second?
24) ext4 - writing to ext4, 8GB partition vs 512MB partition
25) code-review - Teaching a loved one about secure coding practices
26) bash - Getting access to a variable inside a sudo clause in a script with EOF
27) cryptography - At what level of abstraction should a developer work with with regards to cryptography?
28) python - How to pass argv arguments to a C program using a file or python script in linux?
29) compiling - Is automake and autoconf the standard way to compile code?
30) malware - Becoming a malware analyst?
31) programming - Is it worth it to fuzz Rust-written software?
32) bash - sudo -u user bash works but $HOME is not changing accordingly
33) memory - Memory address problem in GNU Debugger
34) penetration-test - Builder vs. Breaker - Do developers make good pen testers & vice versa
35) buffer-overflow - What is a buffer overflow?
36) shell-script - Does the shell script interpreter optimize if else chains?
37) windows - Is it common to allow local desktop and/or active directory admin access and rights for developers in organizations?
38) linux - Binary compatibility between Mac OS X and Linux
39) sql-injection - Good analogy needed: Sec issues due to different coders implementing the same features in different ways for the same app
40) software - how can an attacker use a fake temp file to compromise a program?
41) webserver - Simplest way to add a data lookup to an HTML website on Ubuntu?
42) memory - Are some programming languages more secure than others?
43) linux - How do I install drjava in linux from terminal?
44) exploit - stdin does not wait for next input after ROP chain
45) .net - Programming languages for security?
46) penetration-test - What defines a programming language as useful for hacking?
47) cryptography - What benefits do Hardware Security Modules provide when keys are not stored inside them?
48) vulnerability - Do high-level programming languages have more vulnerabilities or security risks than low-level languages?
49) programming - Why is security generally overlooked in application code until it's too late?
50) programming - Would it be good secure programming practice to overwrite a "sensitive" variable before deleting it?