Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Comparing multiple attributes of the file increases the likelihood that the reopened file is the same file that had been previously operated on.

Applications should also File identification is less of an issue if applications maintain their files in secure directories, when possible, where they can only be accessed by the owner of the file and (possibly) by a system administrator.

...

The following non-compliant code example opens a file for writing, closes it, opens the same named file for reading, and closes a file multiple times. It then closes it again. The logic relies solely on the file name to identify the file.

...