Discover secure coding guidelines, include the articles, news, trends, analysis and practical advice about secure coding guidelines on alibabacloud.com
directly allocated NIO buffer to read sensitive data from a file. After the data has been used. It can be cleared immediately, and sensitive data is not slow to exist in multiple locations, only in system memory.void ReadData () {Bytebuffer BB = bytebuffer.allocatedirect (16*1024); try (filechannel rdr = (new FileInputStream ("file")) . Getchannel ()) {while (Rdr.read (BB) > 0) {//does something with the Bufferbb.clear ();}} catch (Throwable e) {//Handle err or}}It is important to note that the
It is necessary to master some Cross-browser compliant CSS coding guidelines.
First: Understand the CSS box model (learning div+css layout is also very important, learn the CSS box model to learn DIV+CSS is not difficult)
A thorough understanding of the CSS box model is the first thing, the CSS box model is not difficult, and basically supports all browsers, except for some specific conditions of IE brows
Browsers are getting more and more, which means that the more difficult it is to do the Web front-end development. Now the core of the browser is the same, for the compatibility of CSS will also have a certain difference! Used to talk about using CSS hack is not an easy thing, with too much CSS hack to be compatible with a lot of bloated code, so it is necessary to master some Cross-browser compatible CSS coding g
Refer:
[1] Apple official
[2] Three programming naming rules (Hungary, small hump, and big hump)
The following is my personal reading notes for coding guidelines for cocoa. It mainly lists several items that are easy to violate. For details, see reference 1.
1. clarity and consistency
1) Apple generally uses the small camper name method, that is, the first letter of the first word is lowercase, and the fir
tutorials on the Internet to explain how to use PHP to add a fancy feature to development applications, but most of them do not cover how to ensure the security of these features, this prevents applications from being vulnerable to attacks. Therefore, PHP applications with rich functions are generally not developed in a secure way.
Train your developers to write code with secure thinking, which is more imp
applications from being vulnerable to attacks. Therefore, PHP applications with rich functions are generally not developed in a secure way.
Train your developers to write code with secure thinking, which is more important than the choice of language. CERT (Computer Emergency Response Team, Computer Emergency Response Team) found that vulnerabilities in most applications come from common programming error
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.