Nous utilisons des cookies pour améliorer votre expérience de navigation. En savoir plus
Accepter
to the top

Webinar: Let's make a programming language. Lexer - 29.04

>
>
Posts: #Knowledge

Posts: # Knowledge

25 Jul 2022
Application Security Testing. How not to get confused between SAST, DAST, and IAST
Alexey Sarkisov
What benefits does SAST have? What's the difference between SAST and DAST? What's IAST? What do all these words mean?! Let's talk about this and more in the overview of the main types of...
...
22 Jul 2022
What is CVE and what vulnerabilities can it tell us about?
Mikhail Evtihevich
You may often come across the CVE abbreviation in articles about various vulnerabilities and publications on information security incidents. CVE (Common Vulnerabilities and Exposures) is a list...
...
Subscribe to the newsletter
Want to receive a monthly digest of the most interesting articles and news? Subscribe!
20 Jul 2022
CWE Top 25 2022. Review of changes
Mikhail Gelvikh
The CWE Top 25 list reflects the most serious software security weaknesses. I invite you to read the updated top list to become aware of the changes happened over the past...
...
Intermodular analysis of C and C++ projects in detail. Part 2
Oleg Lisiy
In part 1 we discussed the basics of C and C++ projects compiling. We also talked over linking and optimizations. In part 2 we are going to delve deeper into intermodular analysis and discuss...
...
Intermodular analysis of C and C++ projects in detail. Part 1
Oleg Lisiy
Starting from PVS-Studio 7.14, the C and C++ analyzer has been supporting intermodular analysis. In this two-part article, we'll describe how similar mechanisms are arranged in compilers and...
...
20 Avr 2022
Four reasons to check what the malloc function returned
Andrey Karpov
Some developers may be dismissive of checks: they deliberately do not check whether the malloc function allocated memory or not. Their reasoning is simple — they think that there will be...
...
Trojan Source: Invisible Vulnerabilities
Guest
We present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding...
...
Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice
Sergey Vasiliev
How can simple XML files processing turn into a security weakness? How can a blog deployed on your machine cause a data leak? Today we'll find answers to these questions, learn what XXE is and how...
...
Design and evolution of constexpr in C++
Guest
constexpr is one of the magic keywords in modern C++. You can use it to create code, that is then executed before the compilation process ends. This is the absolute upper limit for...
...
C++20 Ranges — Complete Guide
Guest
C++20 Ranges, also known as STL v2, effectively replaces existing STL algorithms and facilities. In this article, I will guide you through the changes that Ranges introduce, talk about Views...
...
View more Pagination arrow previous
Showing: - of 164