¡@

Home 

c# Programming Glossary: vulnerable

How to preventing decompilation of any C# application

http://stackoverflow.com/questions/1276237/how-to-preventing-decompilation-of-any-c-sharp-application

and other decompilers which makes our code very much vulnerable for copying. Our customer base is not Corporates but medical..

Sending an array of values to Oracle procedure to use in WHERE IN clause

http://stackoverflow.com/questions/13580245/sending-an-array-of-values-to-oracle-procedure-to-use-in-where-in-clause

are two concerns with going this way I make my website vulnerable to SQL injections In my stored proc I have to use EXECUTE 'SELECT..

Password encryption/ decryption code in .NET

http://stackoverflow.com/questions/1678555/password-encryption-decryption-code-in-net

string remains in memory and makes your application vulnerable per se. If runtime protection is essential see cref SecureString..

Understanding floating point problems

http://stackoverflow.com/questions/4664662/understanding-floating-point-problems

this. How can one determine if any specific method will be vulnerable to errors in floating point operations at what precision will..

Protect .NET code from reverse engineering?

http://stackoverflow.com/questions/506282/protect-net-code-from-reverse-engineering

machine code and every application that is runnable is vulnerable. What you want to do is just make it difficult enough to crack..

Is using Thread.Abort() and handling ThreadAbortException in .NET safe practice?

http://stackoverflow.com/questions/6382997/is-using-thread-abort-and-handling-threadabortexception-in-net-safe-practice

code for the clean up code. But then that code is it self vulnerable so you need clean up code for the clean up code of the clean..

Are .NET ref parameters thread-safe, or vulnerable to unsafe multithreaded access?

http://stackoverflow.com/questions/679654/are-net-ref-parameters-thread-safe-or-vulnerable-to-unsafe-multithreaded-acces

.NET ref parameters thread safe or vulnerable to unsafe multithreaded access Edit for intro We know that..

Events - naming convention and style

http://stackoverflow.com/questions/724085/events-naming-convention-and-style

Tick null Tick this EventArgs.Empty However this is still vulnerable in a multithreaded environment if the listener is unregistered..

Which cryptographic hash function should I choose?

http://stackoverflow.com/questions/800685/which-cryptographic-hash-function-should-i-choose

it really easy to use for identification. MD5 however is vulnerable to collision attacks SHA1 is also vulnerable but to a lesser.. however is vulnerable to collision attacks SHA1 is also vulnerable but to a lesser degree. Under what conditions should I use which..