|Submitted on: 10/27/2003 8:05:31 AM |
By: Damian myerscough
By 3 Users
Compatibility:5.0 (all versions), Active Perl specific, 4.0 (all versions), 3.0 (all versions), Pre 3.0
Users have accessed this article 2539 times.
|(About the author)|
| This Article talks about the basics of Perl/CGI security and shows examples of exploiting security holes and avoiding them.
This tutorial was done is Word so to view the images please use word|
Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.
Virus note:All files are scanned once-a-day by Planet Source Code for viruses,but new viruses come out every day, so no prevention program can catch 100% of them.
FOR YOUR OWN SAFETY, PLEASE:
1)Re-scan downloaded files using your personal virus checker before using it.
2)NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
If you don't have a virus scanner, you can get one at many places on the net including:McAfee.com
Terms of Agreement:
By using this article, you agree to the following terms...
1) You may use
this article in your own programs (and may compile it into a program and distribute it in compiled format for languages that allow it) freely and with no charge.
2) You MAY NOT redistribute this article (for example to a web site) without written permission from the original author. Failure to do so is a violation of copyright laws.
3) You may link to this article from another website, but ONLY if it is not wrapped in a frame.
4) You will abide by any additional copyright restrictions which the author may have placed in the article or article's description.
Other 23 submission(s) by this author
|Report Bad Submission|
See Voting Log |
|Other User Comments|
|10/28/2003 1:19:43 PM:Jason Myerscough|
The article cover some interesting
aspects of programming and overall i
thought it was very good.
|1/4/2004 10:49:09 AM:Damian myerscough|
Planet who ever you are I aint seen you
contrivute anything?? This was a text
to just show some basic security In
functions Its not meant to be in depht
|1/4/2004 6:19:53 PM:|
Contribute? I've written books and
articles for major publications. Been
active in the Perl community for a
decade, hosted a conference and do more
than you know. I just found this site,
and if your tutorial is an example of
what is published here, then I wish I
hadn't found it. Your article is
terrible and a disservice to beginners.
The security "functions" you show
aren't basic, they are not correct.
Don't post articles which are not
correct, and stop deleting my comments,
as I will not stop so people can be
warned NOT to read this tutorial since
they will learn nothing. You should
remove your article, it has no
substance and your example are
insecure. That doesn't help anyone.
| Add Your Feedback! |
|Note:Not only will your feedback be posted, but an email will be sent to the code's author in your name. |
NOTICE: The author of this article has been kind enough to share it with you. If you have a criticism, please state it politely or it will be deleted.
For feedback not related to this particular article, please click here.