|
You are here |
www.idontplaydarts.com | ||
| | | | |
defuse.ca
|
|
| | | | | Why are websites so insecure? What design patterns will help solve these problems? | |
| | | | |
michaelneuper.com
|
|
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | |
128bit.io
|
|
| | | | | To keep with the previous posting I made with MongoDB, I am going to show some Ruby code of how to connect and push data in to your database. If you take a look at the MongoDB driver page you see that there are a good number of programming languages that are supported by MongoDB.org along with tons that are supported by the community. My languages of choice is Ruby. It's a Supported language from MongoDB. | |
| | | | |
sqlbek.wordpress.com
|
|
| | | Today's post is not only for the SQLNewBlogger Challenge, but is serving double duty as my T-SQL Tuesday contribution! This month's T-SQL Tuesday is being sponsored by Mike Donnelly (b|t) and he has asked us to "Teach Me Something New." This past weekend, I participated in my third SQL Saturday Madison event. Aside from speaking,... | ||