Skip to content
geeksforgeeks
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Tutorials
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
  • Practice
    • Build your AI Agent
    • GfG 160
    • Problem of the Day
    • Practice Coding Problems
    • GfG SDE Sheet
  • Contests
    • Accenture Hackathon (Ending Soon!)
    • GfG Weekly [Rated Contest]
    • Job-A-Thon Hiring Challenge
    • All Contests and Events
  • DSA
  • Practice Problems
  • Python
  • C
  • C++
  • Java
  • Courses
  • Machine Learning
  • DevOps
  • Web Development
  • System Design
  • Aptitude
  • Projects
Similar Topics
Web Technologies
39.3k+ articles
Python
20.2k+ articles
C++
4.2k+ articles
GBlog
3.1k+ articles
C Language
1.9k+ articles
Computer Subject
1.3k+ articles
Ethical Hacking
670+ articles
cryptography
170+ articles
vulnerability
15 articles
C-programming
9 articles

secure-coding

25 posts
"use strict" in JavaScript
Last Updated: 03 December 2024
In JavaScript, "use strict" is a directive that enables strict mode, which was first introduced in ECMAScript 5 (ES5) to assist in the writi...read more
image
secure-coding
Web Technologies
JavaScript
javascript-basics
Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries)
Last Updated: 20 August 2024
SQL injection is one of the most common and dangerous vulnerabilities that can affect a database-driven application. Attackers can exploit t...read more
image
Computer Subject
SQL
secure-coding
sql-injection
Databases
Vulnerability in input() function – Python 2.x
Last Updated: 29 March 2024
This article aims to explain and explore the vulnerability in the input() function in Python 2.x. In Python 3, the raw_input() function was ...read more
Python
secure-coding
vulnerability
Similar Topics
Web Technologies
39.3k+ articles
Python
20.2k+ articles
C++
4.2k+ articles
GBlog
3.1k+ articles
C Language
1.9k+ articles
Computer Subject
1.3k+ articles
Ethical Hacking
670+ articles
cryptography
170+ articles
vulnerability
15+ articles
C-programming
9+ articles
Automated Brute Forcing on web-based login
Last Updated: 29 September 2022
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct ...read more
secure-coding
Ethical Hacking
Session Hijacking
Last Updated: 11 July 2022
What is Session Hijacking?TCP session hijacking is a security attack on a user session over a protected network. The most common method of s...read more
image
secure-coding
Ethical Hacking
Path Traversal Attack and Prevention
Last Updated: 29 September 2022
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/direc ...read more
secure-coding
PHP
Code Injection and Mitigation with Example
Last Updated: 29 September 2022
Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of comprom ...read more
secure-coding
Ethical Hacking
Format String Vulnerability and Prevention with Example
Last Updated: 07 March 2024
A format string is an ASCII string that contains text and format parameters. Example:// A statement with format stringprintf("my name is : ...read more
Computer Subject
secure-coding
C Language
vulnerability
Denial of Service and Prevention
Last Updated: 31 August 2023
Denial of Service (DoS) is a cyber-attack on an individual Computer or Website with the intent to deny services to intended users. Their pur ...read more
Computer Subject
Computer Networks
secure-coding
How to store a password in database?
Last Updated: 13 September 2023
Most of the web applications require their users to authenticate themselves by asking them username and password. They compare the user supp...read more
image
Hash
Technical Scripter
TechTips
Computer Subject
DBMS
secure-coding
DSA
Buffer Overflow Attack with Example
Last Updated: 29 January 2025
A buffer is a temporary area for data storage. When more data (than was originally allocated to be stored) gets placed by a program or syste ...read more
Technical Scripter
Computer Subject
secure-coding
C++
fseek() vs rewind() in C
Last Updated: 07 January 2025
In C, the functions fseek() and rewind() helps in manipulating the position of the pointer in the opened file but serve different purposes a ...read more
GFacts
secure-coding
C Language
C-File Handling
Virtual Destructor
Last Updated: 20 February 2023
Deleting a derived class object using a pointer of base class type that has a non-virtual destructor results in undefined behavior. To corre ...read more
secure-coding
C++
C++-Destructors
"delete this" in C++
Last Updated: 11 November 2021
Ideally delete operator should not be used for this pointer. However, if used, then following points must be considered.1) delete operator w ...read more
cpp-pointer
secure-coding
C Language
C++
gets() is risky to use!
Last Updated: 30 October 2023
Consider the below program. [GFGTABS] C void read(){ char str[20]; gets(str); printf(%s, str); return;}[/GFGTABS]The ...read more
Articles
C-programming
gets
secure-coding
C Language
C Array and String
1 2 >>
Last
1 2 >>
Last
1 2 >>
Last
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox