Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Applications should also maintain their files in secure directories, when possible, where they can only be accessed by the owner of the file and (possibly) by a system administrator.

Non-Compliant Code Example (device / i-node)

This The following non-compliant code example opens and closes a file multiple times. It relies solely on the file name to identify the file.

...