Compare commits
2 Commits
18c36ee123
...
f5f34d864f
| Author | SHA1 | Date | |
|---|---|---|---|
| f5f34d864f | |||
| c30b8214e0 |
10
content/posts/code-complete-summations-general-variables.md
Normal file
10
content/posts/code-complete-summations-general-variables.md
Normal file
@@ -0,0 +1,10 @@
|
||||
---
|
||||
title: "Variable Names: Code Complete Summations"
|
||||
date: 2023-11-13
|
||||
draft: true
|
||||
---
|
||||
|
||||
# Introduction
|
||||
|
||||
The way variables are handled can have an outsized impact on security. There are a few ways to handle using variables that can mitigate some vulnerabilities.
|
||||
|
||||
10
content/posts/code-complete-summations-variable-names.md
Normal file
10
content/posts/code-complete-summations-variable-names.md
Normal file
@@ -0,0 +1,10 @@
|
||||
---
|
||||
title: "Variable Names: Code Complete Summations"
|
||||
date: 2023-11-13
|
||||
draft: true
|
||||
---
|
||||
|
||||
# Introduction
|
||||
|
||||
Something that is probably overlooked when talking about creating secure programs is variable names. It seems simple at first, but can cause major problems in developing complex programs.
|
||||
|
||||
Reference in New Issue
Block a user