Skip to content
Courses
DSA to Development
Machine Learning & Data Science
Generative AI & ChatGPT
Become AWS Certified
DSA Courses
Data Structure & Algorithm(C++/JAVA)
Data Structure & Algorithm(Python)
Data Structure & Algorithm(JavaScript)
Programming Languages
CPP
Java
Python
JavaScript
C
All Courses
Tutorials
Python
Python Tutorial
Python Programs
Python Quiz
Python Projects
Python Interview Questions
Python Data Structures
Java
Java Tutorial
Java Collections
Java 8 Tutorial
Java Programs
Java Quiz
Java Projects
Java Interview Questions
Advanced Java
Programming Languages
JavaScript
C++
R Tutorial
SQL
PHP
C#
C
Scala
Perl
Go Language
Kotlin
System Design
System Design Tutorial
Software Design Patterns
System Design Roadmap
Top 10 System Design Interview Questions and Answers
Interview Corner
Company Preparation
Top Topics
Practice Company Questions
Interview Experiences
Experienced Interviews
Internship Interviews
Competitive Programming
Multiple Choice Quizzes
Aptitude for Placements
Computer Science Subjects
Operating System
DBMS
Computer Networks
Engineering Mathematics
Computer Organization and Architecture
Theory of Computation
Compiler Design
Digital Logic
Software Engineering
DevOps
GIT
AWS
Docker
Kubernetes
Microsoft Azure Tutorial
Google Cloud Platform
Linux
Linux Tutorial
Linux Commands A-Z
Linux Commands Cheatsheet
File Permission Commands
Linux System Administration
Linux File System
Linux Shell Scripting
Linux Networking
Linux Interview Questions
Software Testing
Software Testing Tutorial
Software Engineering Tutorial
Testing Interview Questions
Jira
Databases
DBMS Tutorial
SQL Tutorial
PostgreSQL Tutorial
MongoDB Tutorial
SQL Interview Questions
MySQL Interview Questions
PL/SQL Interview Questions
Android
Android Tutorial
Android Studio Tutorial
Kotlin For Android
Android Projects
Android Interview Questions
6 Weeks of Android App Development
Excel
MS Excel Tutorial
Introduction to MS Excel
Data Analysis in Excel
Basic Excel Formulas & Functions
Data Analysis in Advanced Excel
Workbooks
Statistical Functions
Data Visualization in Excel
Pivot Tables in Excel
Excel Spreadsheets in Python
Basic Excel Shortcuts
Mathematics
Number System
Algebra
Linear Algebra
Trigonometry
Set Theory
Statistics
Probability
Geometry
Mensuration
Logarithms
Calculus
DSA
Data Structures
Arrays
Matrix
Strings
Linked List
Stack
Queue
Tree
Heap
Hashing
Graph
Set Data Structure
Map Data Structure
Advanced Data Structure
Data Structures Tutorial
Algorithms
Analysis of Algorithms
Design and Analysis of Algorithms
Asymptotic Analysis
Asymptotic Notations
Worst, Average and Best Cases
Searching Algorithms
Linear Search
Binary Search
Searching Algorithms Tutorial
Sorting Algorithms
Selection Sort
Bubble Sort
Insertion Sort
Merge Sort
Quick Sort
Heap Sort
Counting Sort
Radix Sort
Bucket Sort
Sorting Algorithms Tutorial
Greedy Algorithms
Dynamic Programming
Graph Algorithms
Pattern Searching
Recursion
Backtracking
Divide and Conquer
Mathematical Algorithms
Geometric Algorithms
Bitwise Algorithms
Randomized Algorithms
Branch and Bound
Algorithms Tutorial
DSA Tutorial
Practice
All DSA Problems
Problem of the Day
Company Wise Coding Practice
Amazon
Microsoft
Flipkart
Explore All
GfG SDE Sheet
Practice Problems Difficulty Wise
School
Basic
Easy
Medium
Hard
Language Wise Coding Practice
CPP
Java
Python
Curated DSA Lists
Beginner's DSA Sheet
Top 50 Array Problems
Top 50 String Problems
Top 50 DP Problems
Top 50 Graph Problems
Top 50 Tree Problems
Competitive Programming
Company Wise SDE Sheets
Facebook SDE Sheet
Amazon SDE Sheet
Apple SDE Sheet
Netflix SDE Sheet
Google SDE Sheet
DSA Cheat Sheets
SDE Sheet
DSA Sheet for Beginners
FAANG Coding Sheet
Product-Based Coding Sheet
Company-Wise Preparation Sheet
Top Interview Questions
Puzzles
All Puzzles
Top 100 Puzzles Asked In Interviews
Top 20 Puzzles Commonly Asked During SDE Interviews
Data Science
Python Tutorial
R Tutorial
Machine Learning
Data Science using Python
Data Science using R
Data Science Packages
Pandas Tutorial
NumPy Tutorial
Data Visualization
Python Data Visualization Tutorial
Data Visualization with R
Data Analysis
Data Analysis with Python
Data Analysis with R
Deep Learning
NLP Tutorial
Web Tech
HTML Tutorial
CSS Tutorial
JavaScript Tutorial
PHP Tutorial
ReactJS Tutorial
NodeJS Tutorial
Bootstrap Tutorial
Typescript
Web Development Using Python
Django
Django Tutorial
Django Projects
Django Interview Questions
Flask
Flask Tutorial
Flask Projects
Flask Interview Questions
Postman
Github
Cheat Sheets
HTML Cheat Sheet
CSS Cheat Sheet
JavaScript Cheat Sheet
React Cheat Sheet
Angular Cheat Sheet
jQuery Cheat Sheet
Bootstrap Cheat Sheet
Learn Complete Web Development
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
▲
Similar Topics
Web Technologies
41k+ articles
Python
20.1k+ articles
C++
4.1k+ articles
GBlog
3.7k+ articles
C Language
1.9k+ articles
Computer Subject
1.8k+ articles
cryptography
180+ articles
vulnerability
15 articles
C-programming
9 articles
Web Security
6 articles
secure-coding
25 posts
Popular Articles
Recent Articles
"use strict" in JavaScript
Last Updated: 03 December 2024
In JavaScript, "use strict" is a directive that enables strict mode, which was first introduced in ECMAScript 5 (ES5) to assist in the writi
...read more
secure-coding
Web Technologies
JavaScript
javascript-basics
Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries)
Last Updated: 20 August 2024
SQL injection is one of the most common and dangerous vulnerabilities that can affect a database-driven application. Attackers can exploit t
...read more
Computer Subject
SQL
secure-coding
sql-injection
Databases
Vulnerability in input() function – Python 2.x
Last Updated: 29 March 2024
This article aims to explain and explore the vulnerability in the input() function in Python 2.x. In Python 3, the raw_input() function was
...read more
Python
secure-coding
vulnerability
Similar Topics
Web Technologies
41k+ articles
Python
20.1k+ articles
C++
4.1k+ articles
GBlog
3.7k+ articles
C Language
1.9k+ articles
Computer Subject
1.8k+ articles
cryptography
180+ articles
vulnerability
15+ articles
C-programming
9+ articles
Web Security
6+ articles
Automated Brute Forcing on web-based login
Last Updated: 29 September 2022
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct
...read more
Computer Subject
secure-coding
Session Hijacking
Last Updated: 11 July 2022
What is Session Hijacking?TCP session hijacking is a security attack on a user session over a protected network. The most common method of s
...read more
Computer Subject
secure-coding
Path Traversal Attack and Prevention
Last Updated: 29 September 2022
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/direc
...read more
Computer Subject
secure-coding
Code Injection and Mitigation with Example
Last Updated: 29 September 2022
Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of comprom
...read more
Computer Subject
secure-coding
Format String Vulnerability and Prevention with Example
Last Updated: 07 March 2024
A format string is an ASCII string that contains text and format parameters. Example:// A statement with format stringprintf("my name is :
...read more
Computer Subject
secure-coding
C Language
vulnerability
Denial of Service and Prevention
Last Updated: 31 August 2023
Denial of Service (DoS) is a cyber-attack on an individual Computer or Website with the intent to deny services to intended users. Their pur
...read more
Computer Subject
Computer Networks
secure-coding
How to store a password in database?
Last Updated: 13 September 2023
Most of the web applications require their users to authenticate themselves by asking them username and password. They compare the user supp
...read more
Hash
Technical Scripter
TechTips
Computer Subject
DBMS
secure-coding
DSA
Buffer Overflow Attack with Example
Last Updated: 29 January 2025
A buffer is a temporary area for data storage. When more data (than was originally allocated to be stored) gets placed by a program or syste
...read more
Technical Scripter
Computer Subject
secure-coding
C++
fseek() vs rewind() in C
Last Updated: 07 January 2025
In C, the functions fseek() and rewind() helps in manipulating the position of the pointer in the opened file but serve different purposes a
...read more
GFacts
secure-coding
C Language
C-File Handling
Virtual Destructor
Last Updated: 20 February 2023
Deleting a derived class object using a pointer of base class type that has a non-virtual destructor results in undefined behavior. To corre
...read more
secure-coding
C++
C++-Destructors
"delete this" in C++
Last Updated: 11 November 2021
Ideally delete operator should not be used for this pointer. However, if used, then following points must be considered.1) delete operator w
...read more
cpp-pointer
secure-coding
C Language
C++
gets() is risky to use!
Last Updated: 30 October 2023
Consider the below program.[tabby title="C"][sourcecode language="c"]void read(){ char str[20]; gets(str); printf(%s, str); return;}
...read more
Articles
C-programming
gets
secure-coding
C Language
C Array and String
1
2
>>
Last
1
2
>>
Last
1
2
>>
Last
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !