Compare commits
2 Commits
18c36ee123
...
f5f34d864f
| Author | SHA1 | Date | |
|---|---|---|---|
| f5f34d864f | |||
| c30b8214e0 |
10
content/posts/code-complete-summations-general-variables.md
Normal file
10
content/posts/code-complete-summations-general-variables.md
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
---
|
||||||
|
title: "Variable Names: Code Complete Summations"
|
||||||
|
date: 2023-11-13
|
||||||
|
draft: true
|
||||||
|
---
|
||||||
|
|
||||||
|
# Introduction
|
||||||
|
|
||||||
|
The way variables are handled can have an outsized impact on security. There are a few ways to handle using variables that can mitigate some vulnerabilities.
|
||||||
|
|
||||||
10
content/posts/code-complete-summations-variable-names.md
Normal file
10
content/posts/code-complete-summations-variable-names.md
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
---
|
||||||
|
title: "Variable Names: Code Complete Summations"
|
||||||
|
date: 2023-11-13
|
||||||
|
draft: true
|
||||||
|
---
|
||||||
|
|
||||||
|
# Introduction
|
||||||
|
|
||||||
|
Something that is probably overlooked when talking about creating secure programs is variable names. It seems simple at first, but can cause major problems in developing complex programs.
|
||||||
|
|
||||||
Reference in New Issue
Block a user