Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
150 Chapter 4 • Vulnerable CGI Scripts
Regardless of whether you use an interpreted or compiled language
to create your CGI programs, it is important to realize that the biggest
security issue will be you, the programmer. Carelessness is the most
common reason for a security hole existing in a program. If you don’t
program with security in mind, then hackers may take advantage of any
problems with the script.
Unix Shell
Shell commands can be used to perform a number of useful tasks. A
benefit to the Unix shell is that, assuming you’re using a Unix platform
for your Web server, you’re probably already familiar with it.They are
commonly used for quick-and-easy ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312