text stringlengths 11 320k | source stringlengths 26 161 |
|---|---|
Riskware, aportmanteauofriskandsoftware, is a word used to describe software whoseinstallationandexecutionposes a potential risk to ahost computer. Relatively normal programs can often fall into the category of riskware as someapplicationscan be modified for another purpose and used against the computeruseror owner.[1]... | https://en.wikipedia.org/wiki/Riskware |
Aweb application(orweb app) isapplication softwarethat is created withweb technologiesand runs via aweb browser.[1][2]Web applications emerged during the late 1990s and allowed for the server todynamicallybuild a response to the request, in contrast tostatic web pages.[3]
Web applications are commonly distributed via ... | https://en.wikipedia.org/wiki/Web_application#Development |
In the context ofinformation security,social engineeringis the use of psychological influence of people into performing actions or divulgingconfidential information. This differs frompsychological manipulationin that it doesn't need to be controlling, negative or a one-way transaction. Manipulation involves azero-sum g... | https://en.wikipedia.org/wiki/Social_engineering_(security) |
Targeted threatsare a class ofmalwaredestined for one specific organization or industry. A type of crimeware, thesethreatsare of particular concern because they are designed to capture sensitive information. Targeted attacks may include threats delivered via SMTP e-mail, port attacks,zero day attackvulnerabilityexplo... | https://en.wikipedia.org/wiki/Targeted_threat |
Atechnical support scam, ortech support scam, is a type ofscamin which a scammer claims to offer a legitimatetechnical supportservice. Victims contact scammers in a variety of ways, often through fakepop-upsresemblingerror messagesor via fake "help lines" advertised onwebsitesowned by the scammers. Technical support sc... | https://en.wikipedia.org/wiki/Technical_support_scam |
Telemetryis thein situcollection of measurementsor other data at remote points and their automatictransmissionto receiving equipment (telecommunication) for monitoring.[1]The word is derived from theGreekrootstele, 'far off', andmetron, 'measure'. Systems that need external instructions and data to operate require the ... | https://en.wikipedia.org/wiki/Telemetry#Software |
Typosquatting, also calledURL hijacking, asting site, acousin domain, or afake URL, is a form ofcybersquatting, and possiblybrandjackingwhich relies on mistakes such astyposmade by Internet users when inputting awebsite addressinto aweb browser. A user accidentally entering an incorrect website address may be led to an... | https://en.wikipedia.org/wiki/Typosquatting |
Aweb serveriscomputersoftwareand underlyinghardwarethat accepts requests viaHTTP(thenetwork protocolcreated to distributeweb content) or its secure variantHTTPS. A user agent, commonly aweb browserorweb crawler, initiates communication by making a request for aweb pageor otherresourceusing HTTP, and theserverresponds w... | https://en.wikipedia.org/wiki/Web_server#Causes_of_overload |
Webattackeris a do-it-yourselfmalwarecreation kit that includesscriptsthat simplify the task of infecting computers andspam-sending techniques to lure victims to specially riggedWebsites. It was allegedly created by a group ofRussianprogrammers. The kit demands minimal technical sophistication to be manipulated and use... | https://en.wikipedia.org/wiki/Webattacker |
Incomputing, azombieis a computer connected to the Internet that has beencompromisedby ahackervia acomputer virus,computer worm, ortrojan horseprogram and can be used to perform malicious tasks under the remote direction of the hacker. Zombie computers often coordinate together in abotnetcontrolled by the hacker, and ... | https://en.wikipedia.org/wiki/Zombie_(computer_science) |
TheUnixandLinuxaccess rights flagssetuidandsetgid(short forset user identityandset group identity)[1]allow users to run anexecutablewith thefile system permissionsof the executable's owner or group respectively and to change behaviour in directories. They are often used to allow users on a computer system to run progra... | https://en.wikipedia.org/wiki/Setuid |
Ambient authorityis a term used in the study ofaccess controlsystems.
A subject, such as a computer program, is said to be usingambient authorityif it only needs to specify the names of the involved object(s) and the operation to be performed on them in order for a permitted action to succeed.[1][2][3]
In this defini... | https://en.wikipedia.org/wiki/Ambient_authority |
TheCommon Vulnerabilities and Exposures(CVE) system, originallyCommon Vulnerability Enumeration,[1]provides a reference method for publicly knowninformation-securityvulnerabilitiesand exposures.[2]The United States'Homeland Security Systems Engineering and Development Institute FFRDC, operated byThe MITRE Corporation, ... | https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures |
Link rot(also calledlink death,link breaking, orreference rot) is the phenomenon ofhyperlinkstending over time to cease to point to their originally targetedfile,web page, orserverdue to that resource being relocated to a new address or becoming permanently unavailable. A link that no longer points to its target may be... | https://en.wikipedia.org/wiki/Link_rot |
Amemory debuggeris adebuggerfor finding software memory problems such asmemory leaksandbuffer overflows. These are due tobugsrelated to the allocation and deallocation ofdynamic memory. Programs written in languages that havegarbage collection, such asmanaged code, might also need memory debuggers, e.g. for memory lea... | https://en.wikipedia.org/wiki/Memory_debugger |
Incomputer programming, awild branchis aGOTOinstruction where the target address is indeterminate, random or otherwise unintended.[1]It is usually the result of asoftware bugcausing the accidental corruption of apointerorarray index. It is "wild" in the sense that it cannot be predicted to behave consistently. In other... | https://en.wikipedia.org/wiki/Wild_branch |
Incomputer programming, the termhookingcovers a range of techniques used to alter or augment the behaviour of anoperating system, ofapplications, or of other software components by interceptingfunction callsormessagesoreventspassed betweensoftware components. Code that handles such intercepted function calls, events or... | https://en.wikipedia.org/wiki/Hooking |
Aninstruction set simulator(ISS) is asimulationmodel, usually coded in ahigh-level programming language, which mimics the behavior of a mainframe ormicroprocessorby "reading" instructions and maintaining internal variables which represent the processor'sregisters.
Instruction simulationis a methodology employed for on... | https://en.wikipedia.org/wiki/Instruction_set_simulator |
Software analyticsis theanalyticsspecific to the domain ofsoftware systemstaking into accountsource code, static and dynamic characteristics (e.g.,software metrics) as well as related processes of theirdevelopmentandevolution. It aims at describing, monitoring, predicting, and improving the efficiency and effectiveness... | https://en.wikipedia.org/wiki/Runtime_intelligence |
Managed servicesis the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions, ostensibly for the purpose of improved operations and reduced budgetary expenditures through the reduction of directly-employed staff.[1][2][3]It is an alternative to thebrea... | https://en.wikipedia.org/wiki/Managed_services |
Insoftware engineering,profiling(program profiling,software profiling) is a form ofdynamic program analysisthat measures, for example, the space (memory) or timecomplexity of a program, theusage of particular instructions, or the frequency and duration of function calls. Most commonly, profiling information serves to ... | https://en.wikipedia.org/wiki/Software_performance_analysis |
Incomputers,hardware performance counters(HPCs),[1]orhardware countersare a set of special-purposeregistersbuilt into modernmicroprocessorsto store the counts of hardware-related activities. Advanced users often rely on those counters to conduct low-levelperformance analysisortuning.
The number of available hardware c... | https://en.wikipedia.org/wiki/Hardware_performance_counter |
DTraceis a comprehensive dynamictracingframework originally created bySun Microsystemsfortroubleshootingkerneland application problems on production systems in real time.
Originally developed forSolaris, it has since been released under the freeCommon Development and Distribution License(CDDL) inOpenSolarisand its des... | https://en.wikipedia.org/wiki/DTrace |
Oracle Solarisis aproprietaryUnixoperating systemoffered byOracleforSPARCandx86-64basedworkstationsandservers. Originally developed bySun Microsystemsas Solaris, it superseded the company's earlierSunOSin 1993 and became known for itsscalability, especially on SPARC systems, and for originating many innovative features... | https://en.wikipedia.org/wiki/Solaris_(operating_system) |
macOS, previouslyOS Xand originallyMac OS X, is aUnix-based[6][7]operating systemdeveloped and marketed byApplesince 2001. It is the current operating system for Apple'sMac computers. Within the market ofdesktopandlaptopcomputers, it is thesecond most widely used desktop OS, afterMicrosoft Windowsand ahead of allLinuxd... | https://en.wikipedia.org/wiki/MacOS |
FreeBSDis afree-softwareUnix-likeoperating systemdescended from theBerkeley Software Distribution(BSD). The first version was released in 1993 developed from386BSD[4], one of the first fully functional and freeUnixclones on affordable home-class hardware, and has since continuously been the most commonly used BSD-deriv... | https://en.wikipedia.org/wiki/FreeBSD |
Java Management Extensions(JMX) is aJavatechnology that supplies tools for managing and monitoringapplications, system objects, devices (such asprinters) and service-oriented networks. Those resources are represented by objects called MBeans (forManaged Bean). In the API,classescan be dynamically loaded and instantiate... | https://en.wikipedia.org/wiki/Java_Management_Extensions |
Application Response Measurement(ARM) is an open standard published by theOpen Groupfor monitoring and diagnosing performance bottlenecks within complex enterprise applications that useloosely-coupleddesigns orservice-oriented architectures.
It includes anAPIforCandJavathat allows timing information associated with ea... | https://en.wikipedia.org/wiki/Application_Response_Measurement |
Anapplication programming interface(API) is a connection betweencomputersor betweencomputer programs. It is a type of softwareinterface, offering a service to other pieces ofsoftware.[1]A document or standard that describes how to build such a connection or interface is called anAPI specification. A computer system tha... | https://en.wikipedia.org/wiki/Application_programming_interface |
C(pronounced/ˈsiː/– like the letterc)[6]is ageneral-purpose programming language. It was created in the 1970s byDennis Ritchieand remains very widely used and influential. By design, C's features cleanly reflect the capabilities of the targetedCPUs. It has found lasting use inoperating systemscode (especially inkernels... | https://en.wikipedia.org/wiki/C_(programming_language) |
Javais ahigh-level,general-purpose,memory-safe,object-orientedprogramming language. It is intended to letprogrammerswrite once, run anywhere(WORA),[18]meaning thatcompiledJava code can run on all platforms that support Java without the need to recompile.[19]Java applications are typically compiled tobytecodethat can ru... | https://en.wikipedia.org/wiki/Java_(programming_language) |
Incomputer science,dynamic recompilationis a feature of someemulatorsandvirtual machines, where the system mayrecompilesome part of aprogramduring execution. By compiling during execution, the system can tailor the generated code to reflect the program's run-time environment, and potentially produce more efficientcodeb... | https://en.wikipedia.org/wiki/Dynamic_recompilation |
Incomputing,data validationorinput validationis the process of ensuringdatahas undergonedata cleansingto confirm it hasdata quality, that is, that it is both correct and useful. It uses routines, often called "validation rules", "validation constraints", or "check routines", that check for correctness, meaningfulness, ... | https://en.wikipedia.org/wiki/Data_validation |
Cross-browser testingis a type of non-functionalsoftware testingwhereweb applicationsare checked for support across different browsers and devices. Cross-browser testing can also provide an objective, independent view of the status of the web application to allow the business to appreciate and understand the risks of r... | https://en.wikipedia.org/wiki/Cross-browser_testing |
Database testingusually consists of a layered process, including theuser interface(UI) layer, the business layer, the data access layer and the database itself. The UI layer deals with the interface design of the database, while the business layer includes databases supportingbusiness strategies.
Databases, the collec... | https://en.wikipedia.org/wiki/Database_testing |
Domain testingis asoftware testingtechnique that involves selecting a small number of test cases from a nearly infinite group of candidate test cases. It is one of the most widely practiced software testing techniques.Domain knowledgeplays a very critical role while testing domain-specific work.[1][2][3][4][5][6][7]
T... | https://en.wikipedia.org/wiki/Domain_testing |
Dynamic program analysisis the act ofanalyzing softwarethat involves executing aprogram– as opposed tostatic program analysis, which does not execute it.
Analysis can focus on different aspects of the software including but not limited to:behavior,test coverage,performanceandsecurity.
To be effective, the target prog... | https://en.wikipedia.org/wiki/Dynamic_program_analysis |
Insoftware engineering,graphical user interface testingis the process oftestinga product'sgraphical user interface(GUI) to ensure it meets its specifications. This is normally done through the use of a variety oftest cases.
To generate a set oftest cases,test designersattempt to cover all the functionality of the sys... | https://en.wikipedia.org/wiki/Graphical_user_interface_testing |
Anindependent test organizationis an organization, person, or company that tests products, materials, software, etc. according to agreed requirements. The test organization can be affiliated with the government or universities or can be anindependent testing laboratory. They are independent because they are not affil... | https://en.wikipedia.org/wiki/Independent_test_organization |
Manual testingis the process of manuallytesting softwarefor defects. It requires a tester to play the role of an end user where by they use most of the application's features to ensure correct behaviour. To guarantee completeness of testing, the tester often follows a writtentest planthat leads them through a set of im... | https://en.wikipedia.org/wiki/Manual_testing |
Orthogonal array testingis a systematic andstatistically-drivenblack-box testingtechnique employed in the field ofsoftware testing.[1][2]This method is particularly valuable in scenarios where the number of inputs to asystemis substantial enough to make exhaustive testing impractical.
Orthogonal array testing works on... | https://en.wikipedia.org/wiki/Orthogonal_array_testing |
Pair testingis asoftware developmenttechnique in which two team members work together at one keyboard to test thesoftware application. One does the testing and the other analyzes or reviews the testing. This can be done between onetesteranddeveloperorbusiness analystor between two testers with both participants takin... | https://en.wikipedia.org/wiki/Pair_testing |
Reverse semantic traceability(RST) is aquality controlmethod for verification improvement that helps to insure high quality ofartifactsby backward translation at each stage of thesoftware development process.
Each stage of development process can be treated as a series of “translations” from one language to another. A... | https://en.wikipedia.org/wiki/Reverse_semantic_traceability |
This article discusses a set of tactics useful insoftware testing. It is intended as a comprehensive list of tactical approaches tosoftware quality assurance(more widely colloquially known asquality assurance(traditionally called by the acronym "QA")) and general application of thetest method(usually just called "testi... | https://en.wikipedia.org/wiki/Software_testing_tactics |
Test management toolsare used to store information on how testing is to be done, plan testing activities and report the status of quality assurance activities. The tools have different approaches to testing and thus have different sets of features. Generally they are used to maintain and plan manual testing, run or gat... | https://en.wikipedia.org/wiki/Test_management_tool |
Atrace tableis a technique used to test algorithms in order to make sure that no logical errors occur while thecalculationsare being processed. The table usually takes the form of a multi-column, multi-row table; With each column showing avariable, and each row showing each number input into the algorithm and the subse... | https://en.wikipedia.org/wiki/Trace_table |
Web testingissoftware testingthat focuses onweb applications. Complete testing of a web-based system before going live can help address issues before the system is revealed to the public. Issues may include the security of the web application, the basic functionality of the site, its accessibility to disabled and fully... | https://en.wikipedia.org/wiki/Web_testing |
Incomputer science,abstract interpretationis a theory ofsound approximationof thesemantics of computer programs, based onmonotonic functionsoverordered sets, especiallylattices. It can be viewed as a partialexecutionof acomputer programwhich gains information about its semantics (e.g.,control-flow,data-flow) without pe... | https://en.wikipedia.org/wiki/Abstract_interpretation |
In computer science, asimulationis a computation of the execution of some appropriately modelledstate-transition system. Typically this process models the complete state of the system at individual points in a discrete linear time frame, computing each state sequentially from its predecessor. Models for computer progra... | https://en.wikipedia.org/wiki/Symbolic_simulation |
Inmathematicsandcomputer science,[1]computer algebra, also calledsymbolic computationoralgebraic computation, is a scientific area that refers to the study and development ofalgorithmsandsoftwarefor manipulatingmathematical expressionsand othermathematical objects. Although computer algebra could be considered a subfie... | https://en.wikipedia.org/wiki/Symbolic_computation |
Incomputer science, acontrol-flow graph(CFG) is arepresentation, usinggraphnotation, of all paths that might be traversed through aprogramduring itsexecution. The control-flow graph was conceived byFrances E. Allen,[1]who noted thatReese T. Prosserusedboolean connectivity matricesfor flow analysis before.[2]
The CFG i... | https://en.wikipedia.org/wiki/Control-flow_graph |
American Fuzzy Lop(AFL), stylized inall lowercaseasamerican fuzzy lop, is afree softwarefuzzerthat employsgenetic algorithmsin order to efficiently increasecode coverageof thetest cases. So far it has detected hundreds of significantsoftware bugsin major free software projects, includingX.Org Server,[2]PHP,[3]OpenSSL,[... | https://en.wikipedia.org/wiki/American_fuzzy_lop_(fuzzer) |
Aglitchis a short-livedtechnical fault, such as a transient one that corrects itself, making it difficult to troubleshoot. The term is particularly common in thecomputingandelectronicsindustries, incircuit bending, as well as among players ofvideo games. More generally, all types of systems including humanorganizations... | https://en.wikipedia.org/wiki/Glitch |
Aglitchis a short-livedtechnical fault, such as a transient one that corrects itself, making it difficult to troubleshoot. The term is particularly common in thecomputingandelectronicsindustries, incircuit bending, as well as among players ofvideo games. More generally, all types of systems including humanorganizations... | https://en.wikipedia.org/wiki/Glitching |
Insoftware testing,monkey testingis a technique where the user tests the application or system by providingrandominputs and checking the behavior, or seeing whether the application or system will crash. Monkey testing is usually implemented as random, automatedunit tests.
While the source of the name "monkey" is uncer... | https://en.wikipedia.org/wiki/Monkey_testing |
Random testingis a black-boxsoftware testingtechnique where programs are tested bygeneratingrandom, independent inputs. Results of the output are compared against software specifications to verify that the test output is pass or fail.[1]In case of absence of specifications the exceptions of the language are used which ... | https://en.wikipedia.org/wiki/Random_testing |
Incomputer security,coordinated vulnerability disclosure(CVD, sometimes known asresponsible disclosure)[1]is avulnerability disclosuremodel in which a vulnerability or an issue is disclosed to the public only after the responsible parties have been allowed sufficient time topatchor remedy the vulnerability or issue.[2]... | https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure |
Runtime error detectionis asoftware verificationmethod that analyzes a software application as it executes and reportsdefectsthat are detected during that execution. It can be applied duringunit testing,component testing,integration testing,system testing(automated/scripted or manual), orpenetration testing.
Runtime e... | https://en.wikipedia.org/wiki/Runtime_error_detection |
Security testingis a process intended to detect flaws in thesecuritymechanisms of aninformation systemand as such help enable it to protect data and maintain functionality as intended.[1]Due to the logical limitations of security testing, passing the security testing process is not an indication that no flaws exist or ... | https://en.wikipedia.org/wiki/Security_testing |
Incomputer programmingandsoftware testing,smoke testing(alsoconfidence testing,sanity testing,[1]build verification test(BVT)[2][3][4]andbuild acceptance test) is preliminary testing orsanity testingto reveal simple failures severe enough to, for example, reject a prospective software release. Smoke tests are a subset ... | https://en.wikipedia.org/wiki/Smoke_testing_(software) |
System testing, a.k.a.end-to-end (E2E) testing, is testing conducted on a completesoftware system.
System testing describes testing at the system level to contrast to testing at thesystem integration,integrationorunitlevel.
System testing often serves the purpose of evaluating the system's compliance with its specifi... | https://en.wikipedia.org/wiki/System_testing |
Insoftware testing,test automationis the use ofsoftwareseparate from the software being tested to control the execution of tests and the comparison of actual outcomes with predicted outcomes.[1]Test automation can automate some repetitive but necessary tasks in a formalized testing process already in place, or perform ... | https://en.wikipedia.org/wiki/Test_automation |
AnABX testis a method of comparing two choices of sensory stimuli to identify detectable differences between them. A subject is presented with two known samples (sampleA, the first reference, and sampleB, the second reference) followed by one unknown sampleXthat is randomly selected from either A or B. The subject is t... | https://en.wikipedia.org/wiki/ABX_test |
Inengineeringand its varioussubdisciplines,acceptance testingis a test conducted to determine if the requirements of aspecificationorcontractare met. It may involvechemical tests,physical tests, orperformance tests.[1]
Insystems engineering, it may involveblack-box testingperformed on asystem(for example: a piece ofso... | https://en.wikipedia.org/wiki/Acceptance_testing |
In ablindorblinded experiment, information which may influence the participants of theexperimentis withheld until after the experiment is complete. Good blinding can reduce or eliminate experimentalbiasesthat arise from a participants' expectations,observer's effect on the participants,observer bias,confirmation bias, ... | https://en.wikipedia.org/wiki/Blind_experiment |
Anedge caseis a problem or situation that occurs only at an extreme (maximum or minimum) operatingparameter. For example, a stereo speaker might noticeably distort audio when played at maximum volume, even in the absence of any other extreme setting or condition.
An edge case can be expected or unexpected. Inengineeri... | https://en.wikipedia.org/wiki/Boundary_testing |
Asanity checkorsanity testis a basic test to quickly evaluate whether a claim or the result of a calculation can possibly be true. It is a simple check to see if the produced material is rational (that the material's creator was thinking rationally, applyingsanity). The point of a sanity test is to rule out certain cla... | https://en.wikipedia.org/wiki/Sanity_testing |
In software quality assurance,performance testingis in general a testing practice performed to determine how a system performs in terms of responsiveness and stability under a particular workload.[1]It can also serve to investigate, measure, validate or verify other quality attributes of the system, such as scalability... | https://en.wikipedia.org/wiki/Software_performance_testing |
Stress testingis a form of deliberately intense or thorough testing, used to determine the stability of a given system, critical infrastructure or entity. It involves testing beyond normal operational capacity, often to a breaking point, in order to observe the results.
Reasons can include:
Reliability engineersoften... | https://en.wikipedia.org/wiki/Stress_testing |
Unit testing,a.k.a.componentormoduletesting, is a form ofsoftware testingby which isolatedsource codeis tested to validate expected behavior.[1]
Unit testing describes tests that are run at the unit-level to contrast testing at theintegrationorsystemlevel.
Unit testing, as a principle for testing separately smaller p... | https://en.wikipedia.org/wiki/Unit_testing |
Dynamic application security testing(DAST) represents a non-functional testing process to identify security weaknesses and vulnerabilities in an application. This testing process can be carried out either manually or by using automated tools. Manual assessment of an application involves human intervention to identify t... | https://en.wikipedia.org/wiki/Web_application_security_scanner |
White-box testing(also known asclear box testing,glass box testing,transparent box testing, andstructural testing) is a method ofsoftware testingthat tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing). In white-box testing, an internal perspective of the sy... | https://en.wikipedia.org/wiki/White-box_testing |
Inmathematics,statistics, andcomputational modelling, agrey box model[1][2][3][4]combines a partial theoretical structure with data to complete the model. The theoretical structure may vary from information on the smoothness of results, to models that need only parameter values from data or existing literature.[5]Thus,... | https://en.wikipedia.org/wiki/Grey_box_model |
Inmathematics,extrapolationis a type ofestimation, beyond the original observation range, of the value of a variable on the basis of its relationship with another variable. It is similar tointerpolation, which produces estimates between known observations, but extrapolation is subject to greateruncertaintyand a higher ... | https://en.wikipedia.org/wiki/Extrapolation |
Incomputer science,static program analysis(also known asstatic analysisorstatic simulation) is theanalysisof computer programs performed without executing them, in contrast withdynamic program analysis, which is performed on programs during their execution in the integrated environment.[1][2]
The term is usually appli... | https://en.wikipedia.org/wiki/Static_program_analysis |
Dynamic scoringis a forecasting technique forgovernment revenues, expenditures, andbudget deficitsthat incorporates predictions about the behavior of people and organizations based on changes infiscal policy, usuallytax rates. Dynamic scoring depends on models of the behavior ofeconomic agentswhich predict how they wou... | https://en.wikipedia.org/wiki/Dynamic_scoring |
Ineconomics, theLaffer curveillustrates a theoretical relationship betweenratesoftaxationand the resulting levels of the government'stax revenue. The Laffer curve assumes that no tax revenue is raised at the extreme tax rates of 0% and 100%, meaning that there is a tax rate between 0% and 100% that maximizes government... | https://en.wikipedia.org/wiki/Laffer_curve |
Incomputer security, abillion laughs attackis a type ofdenial-of-service (DoS) attackwhich is aimed atparsersofXMLdocuments.[1]
It is also referred to as anXML bombor as an exponential entity expansion attack.[2]
The example attack consists of defining 10 entities, each defined as consisting of 10 of the previous ent... | https://en.wikipedia.org/wiki/Billion_laughs |
Incomputer securityandprogramming, abuffer over-read[1][2]orout-of-bounds read[3]is ananomalywhere aprogram, while readingdatafrom abuffer, overruns the buffer's boundary and reads (or tries to read) adjacent memory. This is a special case of violation ofmemory safety.
Buffer over-reads can be triggered, as in theHea... | https://en.wikipedia.org/wiki/Buffer_over-read |
Coding conventionsare a set of guidelines for a specificprogramming languagethat recommendprogramming style, practices, and methods for each aspect of a program written in that language. These conventions usually cover file organization,indentation,comments,declarations,statements,white space,naming conventions,program... | https://en.wikipedia.org/wiki/Coding_conventions |
Incomputing,end-of-file(EOF)[1]is a condition in a computeroperating systemwhere no more data can be read from a data source. The data source is usually called afileorstream.
In theC standard library, the character-reading functions such asgetcharreturn a value equal to the symbolic value (macro)EOFto indicate that an... | https://en.wikipedia.org/wiki/End-of-file |
Aping of deathis a type of attack on a computer system that involves sending amalformedor otherwise maliciouspingto a computer.[1]In this attack, a host sends hundreds of ping requests with a packet size that is large or illegal to another host to try to take it offline or to keep it preoccupied responding withICMP Ech... | https://en.wikipedia.org/wiki/Ping_of_death |
Aport scanneris an application designed to probe aserverorhostfor openports. Such an application may be used byadministratorsto verifysecuritypolicies of theirnetworksand byattackersto identifynetwork servicesrunning on a host and exploit vulnerabilities.
Aport scanorportscanis a process that sends client requests to ... | https://en.wikipedia.org/wiki/Port_scanner |
A"return-to-libc" attackis acomputer securityattack usually starting with abuffer overflowin which a subroutinereturn addresson acall stackis replaced by an address of a subroutine that is already present in theprocessexecutable memory, bypassing theno-execute bitfeature (if present) and ridding the attacker of the nee... | https://en.wikipedia.org/wiki/Return-to-libc_attack |
Asafety-critical system[2]orlife-critical systemis a system whose failure or malfunction may result in one (or more) of the following outcomes:[3][4]
Asafety-related system(or sometimessafety-involved system) comprises everything (hardware, software, and human aspects) needed to perform one or more safety functions, i... | https://en.wikipedia.org/wiki/Safety-critical_system |
This is a list ofoperating systemsspecifically focused onsecurity. Similar concepts includesecurity-evaluated operating systemsthat have achieved certification from anauditingorganization, andtrusted operating systemsthat provide sufficient support formultilevel securityand evidence ofcorrectnessto meet a particular se... | https://en.wikipedia.org/wiki/Security-focused_operating_system |
Incomputer science,self-modifying code(SMCorSMoC) iscodethat alters its owninstructionswhile it isexecuting– usually to reduce theinstruction path lengthand improveperformanceor simply to reduce otherwiserepetitively similar code, thus simplifyingmaintenance. The term is usually only applied to code where the self-modi... | https://en.wikipedia.org/wiki/Self-modifying_code |
In the context ofsoftware engineering,software qualityrefers to two related but distinct notions:[citation needed]
Many aspects of structural quality can be evaluated onlystaticallythrough the analysis of the software's inner structure, its source code (seeSoftware metrics),[3]at the unit level, and at the system leve... | https://en.wikipedia.org/wiki/Software_quality |
Blind return-oriented programming(BROP) is an exploit technique which can successfully create an exploit even if the attacker does not possess the target binary. BROP attacks shown by Bittau et al. have defeatedaddress space layout randomization(ASLR) andstack canarieson 64-bit systems.
With the current improvements i... | https://en.wikipedia.org/wiki/Blind_return_oriented_programming |
JIT sprayingis a class ofcomputer security exploitthat circumvents the protection ofaddress space layout randomizationanddata execution preventionby exploiting the behavior ofjust-in-time compilation.[1]It has been used to exploit thePDFformat[2]andAdobe Flash.[3]
Ajust-in-time compiler(JIT) by definition produces cod... | https://en.wikipedia.org/wiki/JIT_spraying |
Sigreturn-oriented programming(SROP) is acomputer security exploittechnique that allows an attacker to execute code in presence of security measures such asnon-executable memoryand code signing.[1]It was presented for the first time at the 35thIEEE Symposium on Security and Privacyin 2014 where it won thebest student p... | https://en.wikipedia.org/wiki/Sigreturn-oriented_programming |
Incomputer science,threaded codeis a programming technique where thecodehas a form that essentially consists entirely of calls tosubroutines. It is often used incompilers, which may generate code in that form or be implemented in that form themselves. The code may be processed by aninterpreteror it may simply be a sequ... | https://en.wikipedia.org/wiki/Threaded_code |
Cross-application scripting(CAS) is a vulnerability affecting desktop applications that don't check input in an exhaustive way. CAS allows an attacker to insert data that modifies the behaviour of a particular desktop application. This makes it possible to extract data from inside of the users' systems. Attackers may g... | https://en.wikipedia.org/wiki/Cross-application_scripting |
Cross-site scripting(XSS)[a]is a type of securityvulnerabilitythat can be found in someweb applications. XSS attacks enable attackers toinjectclient-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypassaccess controlssuch as thesame-origin policy. Dur... | https://en.wikipedia.org/wiki/Cross-site_scripting |
printfis aC standard libraryfunctionthatformatstextand writes it tostandard output. The function accepts a formatc-stringargumentand avariablenumber of value arguments that the functionserializesper the format string. Mismatch between the format specifiers and count andtypeof values results inundefined behaviorand poss... | https://en.wikipedia.org/wiki/Printf |
scanf, short for scan formatted, is aCstandard libraryfunctionthat reads andparsestext fromstandard input.
The function accepts a format string parameter that specifies the layout of inputtext. The function parses input text and loads values into variables based ondata type.
Similar functions, with other names, preda... | https://en.wikipedia.org/wiki/Scanf |
Incomputing,syslog(/ˈsɪslɒɡ/) is a standard formessage logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the type of system generating the message, and is assigned ... | https://en.wikipedia.org/wiki/Syslog |
Improper input validation[1]orunchecked user inputis a type ofvulnerabilityincomputer softwarethat may be used forsecurity exploits.[2]This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."[1]
Examples include:
Thi... | https://en.wikipedia.org/wiki/Improper_input_validation |
Incomputer science, atype punningis any programming technique that subverts or circumvents thetype systemof aprogramming languagein order to achieve an effect that would be difficult or impossible to achieve within the bounds of the formal language.
InCandC++, constructs such aspointertype conversionandunion— C++ adds... | https://en.wikipedia.org/wiki/Reinterpret_cast |
Incomputer science,type conversion,[1][2]type casting,[1][3]type coercion,[3]andtype juggling[4][5]are different ways of changing anexpressionfrom onedata typeto another. An example would be the conversion of anintegervalue into afloating pointvalue or its textual representation as astring, and vice versa. Type convers... | https://en.wikipedia.org/wiki/Const_cast |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.