Skip to content
Courses
DSA to Development
Get IBM Certification
Newly Launched!
Master Django Framework
Become AWS Certified
For Working Professionals
Interview 101: DSA & System Design
Data Science Training Program
JAVA Backend Development (Live)
DevOps Engineering (LIVE)
Data Structures & Algorithms in Python
For Students
Placement Preparation Course
Data Science (Live)
Data Structure & Algorithm-Self Paced (C++/JAVA)
Master Competitive Programming (Live)
Full Stack Development with React & Node JS (Live)
Full Stack Development
Data Science Program
All Courses
Tutorials
Data Structures & Algorithms
ML & Data Science
Interview Corner
Programming Languages
Web Development
CS Subjects
DevOps And Linux
School Learning
Practice
Build your AI Agent
GfG 160
Problem of the Day
Practice Coding Problems
GfG SDE Sheet
Contests
Accenture Hackathon (Ending Soon!)
GfG Weekly [Rated Contest]
Job-A-Thon Hiring Challenge
All Contests and Events
DSA
Practice Problems
Python
C
C++
Java
Courses
Machine Learning
DevOps
Web Development
System Design
Aptitude
Projects
Sign In
▲
Similar Topics
Web Technologies
40.3k+ articles
Python
20.1k+ articles
C++
4k+ articles
GBlog
3.1k+ articles
C Language
1.8k+ articles
Computer Subject
1.7k+ articles
cryptography
170+ articles
vulnerability
15 articles
C-programming
9 articles
Web Security
4 articles
secure-coding
25 posts
Popular Articles
Recent Articles
"use strict" in JavaScript
Last Updated: 03 December 2024
In JavaScript, "use strict" is a directive that enables strict mode, which was first introduced in ECMAScript 5 (ES5) to assist in the writi
...read more
secure-coding
Web Technologies
JavaScript
javascript-basics
Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries)
Last Updated: 20 August 2024
SQL injection is one of the most common and dangerous vulnerabilities that can affect a database-driven application. Attackers can exploit t
...read more
Computer Subject
SQL
secure-coding
sql-injection
Databases
Vulnerability in input() function – Python 2.x
Last Updated: 29 March 2024
This article aims to explain and explore the vulnerability in the input() function in Python 2.x. In Python 3, the raw_input() function was
...read more
Python
secure-coding
vulnerability
Similar Topics
Web Technologies
40.3k+ articles
Python
20.1k+ articles
C++
4k+ articles
GBlog
3.1k+ articles
C Language
1.8k+ articles
Computer Subject
1.7k+ articles
cryptography
170+ articles
vulnerability
15+ articles
C-programming
9+ articles
Web Security
4+ articles
Automated Brute Forcing on web-based login
Last Updated: 29 September 2022
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct
...read more
Computer Subject
secure-coding
Session Hijacking
Last Updated: 11 July 2022
What is Session Hijacking?TCP session hijacking is a security attack on a user session over a protected network. The most common method of s
...read more
Computer Subject
secure-coding
Path Traversal Attack and Prevention
Last Updated: 29 September 2022
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/direc
...read more
Computer Subject
secure-coding
Code Injection and Mitigation with Example
Last Updated: 29 September 2022
Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of comprom
...read more
Computer Subject
secure-coding
Format String Vulnerability and Prevention with Example
Last Updated: 07 March 2024
A format string is an ASCII string that contains text and format parameters. Example:// A statement with format stringprintf("my name is :
...read more
Computer Subject
secure-coding
C Language
vulnerability
Denial of Service and Prevention
Last Updated: 31 August 2023
Denial of Service (DoS) is a cyber-attack on an individual Computer or Website with the intent to deny services to intended users. Their pur
...read more
Computer Subject
Computer Networks
secure-coding
How to store a password in database?
Last Updated: 13 September 2023
Most of the web applications require their users to authenticate themselves by asking them username and password. They compare the user supp
...read more
Hash
Technical Scripter
TechTips
Computer Subject
DBMS
secure-coding
DSA
Buffer Overflow Attack with Example
Last Updated: 29 January 2025
A buffer is a temporary area for data storage. When more data (than was originally allocated to be stored) gets placed by a program or syste
...read more
Technical Scripter
Computer Subject
secure-coding
C++
fseek() vs rewind() in C
Last Updated: 07 January 2025
In C, the functions fseek() and rewind() helps in manipulating the position of the pointer in the opened file but serve different purposes a
...read more
GFacts
secure-coding
C Language
C-File Handling
Virtual Destructor
Last Updated: 20 February 2023
Deleting a derived class object using a pointer of base class type that has a non-virtual destructor results in undefined behavior. To corre
...read more
secure-coding
C++
C++-Destructors
"delete this" in C++
Last Updated: 11 November 2021
Ideally delete operator should not be used for this pointer. However, if used, then following points must be considered.1) delete operator w
...read more
cpp-pointer
secure-coding
C Language
C++
gets() is risky to use!
Last Updated: 30 October 2023
Consider the below program.[tabby title="C"][sourcecode language="c"]void read(){ char str[20]; gets(str); printf(%s, str); return;}
...read more
Articles
C-programming
gets
secure-coding
C Language
C Array and String
1
2
>>
Last
1
2
>>
Last
1
2
>>
Last
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !