Skip to main content
8 votes
Accepted

If we are allowing anonymous users to register inside our web site, how we can prevent hackers from occupying others' email address

The purpose of verifying the email address is to obtain proof that the owner of the email address and the user who registered are the same person. It therefore follows, that the logical thing to do if ...
Joe's user avatar
  • 434
5 votes

Resorted to Unconventional( i.e., hacky) "circuitous" programming code techniques when using populating a list of C# Action Delegates via a for loop

This isn't how you would iterate a dictionary. For one, it does a linear walk through its keys/values on every call to .Keys.ElementAt(i), which is really wasteful. More importantly, it's just more ...
Alexander's user avatar
  • 5,205
3 votes

Ken thompson's compiler hack

No. The source code is not usable since it cannot be executed, only machine code can be executed. And to transform it into a binary you need a compiler. But you have no assurance that the compiler you ...
Kilian Foth's user avatar
2 votes

Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server?

Theoretically, yes. Practically, the people that write these things (or at least, the people that write the toolkits to generate these things) aren't dumb and know that people will try and decompile ...
Philip Kendall's user avatar
2 votes

Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server?

it's possible to reverse engineer a Botnet "Node" (aka the Client/Malware), to find hard-coded values, like the IP of the Command Server (CnC Server) to catch the Operator of the Botnet? ...
candied_orange's user avatar
1 vote

Why did SQL injection prevention mechanism evolve into the direction of using parameterized queries?

Offering an alternative perspective on this one - I see SQL injection (and other injection attacks) as being a serialisation problem... you're taking a complex structure (in this case, a database ...
Simon Geard's user avatar

Only top scored, non community-wiki answers of a minimum length are eligible