Click here to Skip to main content
15,174,178 members
Articles / All Topics

Tagged as

Stats

12.2K views
2 bookmarked

OWASP Top 10 Risks: #1: Injection

Rate me:
Please Sign up or sign in to vote.
5.00/5 (2 votes)
27 Jun 2014CPOL14 min read
We all have probably witnessed (and had a good laugh) when commands have been mixed with data as in the case where the baker literally writes the instructions for the message as the cake message.

Views

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

Max R McCarty
Software Developer
United States United States
We all hear about the security breaches that occur regularly. But how much does the everyday developer give thought to software security? With some of the of great voices out there, I hope to help bring clarity and information that the everyday developer can use when it comes to their everyday craft. But at the end of the day, I’m a Husband, father of 2, Christian and a software developer in Pittsburgh Pa.

As I like to say, “Some people work for a living, I get to program.”

Comments and Discussions