processed by 1.php for high security--Text input boxUser name: Maxlength= "6" limit input character lengthReadonly= "ReadOnly" To set the input box to read-only (cannot be edited)disabled= "Disabled" input box is activeName= the name of the "username" input BoxValue= "XXXX" to pass the input box contents to the processing file--Password entry boxPassword: All the properties of the text input box are valid for the Password entry box--Radio boxYou can
the checklist should is specific and, if possible, something you can make a binary decisio n About. This helps-avoid inconsistency in judgments. It is also a good idea to share the list with your team and get their agreement on its content. Make sure to review the checklist periodically too, to check for that all item is still relevant.Armed with a great checklist, you can raise the number of defects you detect during code reviews. This would help yo
measurement explained?
No documents written
Is there any incomplete code? If So, should it is removed or flagged with a suitable marker like ' TODO '?
No documents written
Testing
Is the code testable? i.e. don ' t add too many or hide dependencies, unable to initialize objects, test frameworks can use methods etc.
Code can test
Do tests exist and is they comprehensive? i.e. have at least your agreed on code coverage.
N
Peer Personal Code Review resultsI. GENERAL INSPECTION1, the code can run normally, the basic can realize the predetermined function, there is no big logic error.2, the code structure is very clear, the module is done very well, very good use of object-oriented programming ideas, easy to read and understand.3, the string matching can be used in the library function of the regular expression, of course, when
target system. Once the target system is completely damaged, it is used as an intermediate point to penetrate the system security in other subnets, where the same process will be executed, as an intermediate point, we do not know the process of occurrence.Finally, in order to test the attention of all system staff, I initiated a large number of attacks to determine the response of employees. But no one knows what happened.
ConclusionThe conclusion in
Author: snilsor
Statement:This article is not written by myself. It is applicable to Windows 2000 or later. The experiment involved in this article is passed under Windwos 2003)---------------Build the ultimate defense line for personal computer security.----------------------------------------[1. Disable default sharing]1. View local shared resources firstRun-cmd-enter net share2. Delete sharing (input one
Security Test Report of personal online banking APP on iOS platform
This study was completed within 40 hours (not consecutive)
To protect the owners and users of these applications, this study does not publish discovered vulnerabilities and methods to exploit them.
All tests are performed only on the application (client); the study ruled out any server-side tests
You have contacted some affected banks and s
need to use the tool> database utility> to compress and fix the database!My settings are as follows:Password settings are complex and MD5 encryption. Use the first method to add the nodwon table and field, and change the database suffix to asp, change the name to % 24 # $ % da # % ta @ # % conn #. asp.I think the personal homepage is safe, but the security is not absolute.
Password 30 thousandThis is the l
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.