|
You are here |
blog.peterritchie.com | ||
| | | | |
michaelneuper.com
|
|
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | |
www.softdevtube.com
|
|
| | | | | Programming history is filled with bugs that turned out to be features and limitations that pushed developers to make even more interesting products. We'll journey through code that was so 'bad' it was actually good. Along the way we'll look at the important role failure plays in learning. Then we'll tame our inner perfectionists and | |
| | | | |
blog.martinig.ch
|
|
| | | | | Informations and opinions about software architecture, developers on call, holacracy, Scrum, continuous testing, product management, saying thank you, tech leadership, customer journey maps, code reviews, code sharing, good bugs, android testing and open source project management. | |
| | | | |
nolanlawson.com
|
|
| | | Update: In a follow-up post, I explore some of the subtleties across browsers in how they fire input events. There is a class of UI performance problems that arise from the following situation: An input event is firing faster than the browser can paint frames. Several events can fit this description: scroll wheel mousemove touchmove... | ||