Chapter 9: Recruitment When trying to find and hire new Developers there are some guidelines you should take into account. If your job listing is focused too much on listing technologies you use and years of experience needed with those technologies you may be attracting the wrong kind of Developers. Just because someone can tick […]Read more "The Software Craftsman Chapters 9 & 10"
An XML External Entity vulnerability is used to attack a program that uses XML files from an external source. If executed properly, an attack can let you view the contents of files on a host system. The way this is done is using entity’s in XML which essentially act as variables. For example: <?xml version=”1.0″ […]Read more "XML External Entity"
A Buffer Overflow is when information is written into a buffer that is to small to held and memory next to the buffer is overwritten. Buffer overflows are usually associated with the C programming language because there is no array bounds checking. Buffer Overflows can be used by an attacker to run malicious code by […]Read more "Buffer Overflow"
This is the excerpt for your very first post.Read more "First blog post"