
548 Appendix • Hack Proofing Your Web Applications Fast Track
Looking for Vulnerabilities
; Review how user data is collected.
; Check for buffer overflows.
; Analyze program output.
; Review file system interaction.
; Audit external component use.
; Examine database queries and connections.
; Track use of network communications.
Pulling It All Together
; Use tools such as Unix grep, GNU less, the DOS find command,
UltraEdit, the free ITS4 Unix program, or Numega to look for the
functions previously listed.
❖ Chapter 7: Securing Your Java Code
Overview of the Java Security Architecture
; The five tenets of security are: containment, authentication, autho-
rization, ...