Tagged articles
3 articles
Page 1 of 1
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

HTTPSSQL injectionSecure Coding
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
360 Quality & Efficiency
360 Quality & Efficiency
Nov 2, 2016 · Information Security

Understanding and Preventing Malicious File Upload Vulnerabilities

This article explains common malicious file‑upload attacks, demonstrates vulnerable PHP upload code, shows how attackers can bypass simple checks, and provides practical prevention techniques such as whitelist validation, MIME‑type verification, and secure storage of uploaded files.

MIME typepreventive measureswhitelisting
0 likes · 6 min read
Understanding and Preventing Malicious File Upload Vulnerabilities