You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

  1. Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Be suspicious of most external data sources, including commandline arguments, network interfaces, environmental variables, and user controlled files.
  1. Compile code using the highest warning level available for your compiler and eliminate warnings by modifying the code.

References

  • No labels