Computers and Technology, 16.04.2020 02:55 panpanriser76
You will describe the various methods used to identify vulnerabilities in the source code.
A. Describe how and when you used methods to visually inspect the code to identify the vulnerabilities you found.
B. Describe how and when you utilized the compiler errors and/or warnings to identify the vulnerabilities you found.
C. Explain how and when you used a static analysis tool to identify the vulnerabilities you found.
Code:#include "Login. h" using namespace std; void Login::enterPassword(void){ puts("Enter 8 character password"); gets(Password); } void Login::copyUsername(string str1, string str2){ strcpy(name, str1.c_str()); strcat(name, " = "); strcat(name, str2.c_str()); cout << name; } int Login::copyPassword(){ strcpy(a, "copypassword"); strcpy(b, "copypassword"); strcpy(c, a); strcat(c, b); printf("a = %s\n", a); return 0; } int Login::testUsernamePassword(void) { arg1 = "Test Username and Password."; while (arg1[i] != '\0') { buff[i] = arg1[i]; i++; } buff[i] = '\0'; printf("buff=%s\n", buff); } void Login::isPasswordOK(void) { puts("Enter Password"); gets(passwordCheck); PwStatus = (strcmp(passwordCheck, "goodpass") == 0); if (PwStatus == false) { puts("Access Denied"); } else { puts("Access Granted"); } } Login::Login() { // TODO Auto-generated constructor stub } Login::~Login() { // TODO Auto-generated destructor stub }
Answers: 1
Computers and Technology, 22.06.2019 09:00
Designing a mobile web page is a little different from designing a regular web page. name at least three features that should be considered when designing a website that is mobile phone-friendly, and briefly explain why they are important.
Answers: 1
Computers and Technology, 22.06.2019 15:10
Which activity should be part of a long-term plan to positively affect yourhealth? oa. wearing regular clothing when handling toxinsob. not worrying about secondhand smokeoc. avoiding excessive exposure to sunlightod. drinking only well water
Answers: 1
Computers and Technology, 23.06.2019 15:00
Barbara is interested in pursuing a career in the science and math pathway. which qualifications will her reach that goal? a.an advanced knowledge of physics and math b.an advanced knowledge of engineering and math c. an advanced knowledge of physics and robotics an d. advanced knowledge of machinery and math
Answers: 2
You will describe the various methods used to identify vulnerabilities in the source code.
Mathematics, 27.11.2020 06:40
History, 27.11.2020 06:50
English, 27.11.2020 06:50
Mathematics, 27.11.2020 06:50
Mathematics, 27.11.2020 06:50
History, 27.11.2020 06:50
Chemistry, 27.11.2020 06:50
Mathematics, 27.11.2020 06:50
Mathematics, 27.11.2020 06:50