¡@

Home 

java Programming Glossary: malicious

Are Thread.stop and friends ever safe in Java?

http://stackoverflow.com/questions/1283328/are-thread-stop-and-friends-ever-safe-in-java

code case out for now. Or at least acknowledge that malicious code can do things to render itself not safely killable and..

Handling passwords used for auth in source code

http://stackoverflow.com/questions/12937641/handling-passwords-used-for-auth-in-source-code

instead and this poses security problems because malicious programs might gain access to that String password data before..

How to implement Java 256-bit AES encryption with CBC

http://stackoverflow.com/questions/1440030/how-to-implement-java-256-bit-aes-encryption-with-cbc

isn't a good idea for them to use the same secret key. One malicious user can recover the key and break the system for everyone...

Must all properties of an immutable object be final?

http://stackoverflow.com/questions/16061030/must-all-properties-of-an-immutable-object-be-final

against misuse of an immutable class by incorrect or malicious code. final fields must be used correctly to provide a guarantee..

How to protect Java codes against decompiler? [closed]

http://stackoverflow.com/questions/1879061/how-to-protect-java-codes-against-decompiler

can't protect the class files from a decompiler and from malicious users. However the output of the decompiler may not be valid..

How do I identify immutable objects in Java

http://stackoverflow.com/questions/203475/how-do-i-identify-immutable-objects-in-java

reading the documentation. I do NOT need to defend against malicious developers anyone clever enough to mutate a String or perform..

What is the security risk of object reflection?

http://stackoverflow.com/questions/3002904/what-is-the-security-risk-of-object-reflection

of internal data is possible. It can lead to various malicious exploits e.g. strings are not immutable anymore and can be changed..

How to “Purify” HTML code to prevent XSS attacks in Java or JSP?

http://stackoverflow.com/questions/3587199/how-to-purify-html-code-to-prevent-xss-attacks-in-java-or-jsp

HTML based on a white list but a user can still inject malicious code with a POST request so this is not enough. A good library..

What are advantages of bytecode over native code? [closed]

http://stackoverflow.com/questions/48144/what-are-advantages-of-bytecode-over-native-code

this kind of validation it doesn't have the instructions a malicious programmer would use to hide their assault. Size In the microprocessor..

Sandbox against malicious code in a Java application

http://stackoverflow.com/questions/502218/sandbox-against-malicious-code-in-a-java-application

against malicious code in a Java application In a simulation server environment..

What's the penalty for Synthetic methods?

http://stackoverflow.com/questions/5557955/whats-the-penalty-for-synthetic-methods

think is private. Synthetic accessors can be exploited by malicious code as demonstrated below. If your code needs to run in a secure..

Why put JSP in WEB-INF?

http://stackoverflow.com/questions/6825907/why-put-jsp-in-web-inf

including db.jsp but by itself it throws an exception a malicious user can open http yoursite.com db.jsp and get some insight..

How to encrypt a .jar file

http://stackoverflow.com/questions/7187883/how-to-encrypt-a-jar-file

Since this second jar file cannot be itself encrypted a malicious user wanting to see you class files can simply look at classes..