This article is the first one in a series about the main types of security holes in applications. We'll show the ways to avoid them by changing your development habits a little. This set of articles shows methods which can be . . .
This article is the first one in a series about the main types of security holes in applications. We'll show the ways to avoid them by changing your development habits a little. This set of articles shows methods which can be used to damage a Unix system. We could only have mentioned them or said a few words about them, but we prefer complete explanations to make people understand the risks. Thus, when debugging a program or developing your own, you'll be able to avoid or correct these mistakes. For each discussed hole, we will take the same approach. We'll start detailing the way it works. Next, we will show how to avoid it. For every example we will use security holes still present in wide spread software.