8
votes
Accepted
If we are allowing anonymous users to register inside our web site, how we can prevent hackers from occupying others' email address
The purpose of verifying the email address is to obtain proof that the owner of the email address and the user who registered are the same person. It therefore follows, that the logical thing to do if ...
5
votes
Resorted to Unconventional( i.e., hacky) "circuitous" programming code techniques when using populating a list of C# Action Delegates via a for loop
This isn't how you would iterate a dictionary. For one, it does a linear walk through its keys/values on every call to .Keys.ElementAt(i), which is really wasteful. More importantly, it's just more ...
3
votes
Ken thompson's compiler hack
No. The source code is not usable since it cannot be executed, only machine code can be executed. And to transform it into a binary you need a compiler. But you have no assurance that the compiler you ...
2
votes
Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server?
Theoretically, yes.
Practically, the people that write these things (or at least, the people that write the toolkits to generate these things) aren't dumb and know that people will try and decompile ...
2
votes
Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server?
it's possible to reverse engineer a Botnet "Node" (aka the Client/Malware), to find hard-coded values, like the IP of the Command Server (CnC Server) to catch the Operator of the Botnet?
...
1
vote
Why did SQL injection prevention mechanism evolve into the direction of using parameterized queries?
Offering an alternative perspective on this one - I see SQL injection (and other injection attacks) as being a serialisation problem... you're taking a complex structure (in this case, a database ...
Only top scored, non community-wiki answers of a minimum length are eligible
Related Tags
hacking × 24security × 10
linux × 4
unix × 3
open-source × 2
productivity × 2
source-code × 2
design × 1
c# × 1
architecture × 1
javascript × 1
php × 1
web-development × 1
testing × 1
programming-languages × 1
sql × 1
development-process × 1
asp.net × 1
language-agnostic × 1
compiler × 1
ios × 1
history × 1
software × 1
legal × 1
asp.net-core × 1