This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Application Security News"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
* '''[http://www.newsforge.com/article.pl?sid=06/05/23/2141246 Custom escaping considered harmful]''' - "Applications using 'ad-hoc methods to "escape" strings going into the database, such as regexes, or PHP3's addslashes() and magic_quotes' are particularly unsafe. Since these bypass database-specific code for safe handling of strings, many such applications will need to be re-written to become secure."
 
* '''[http://www.newsforge.com/article.pl?sid=06/05/23/2141246 Custom escaping considered harmful]''' - "Applications using 'ad-hoc methods to "escape" strings going into the database, such as regexes, or PHP3's addslashes() and magic_quotes' are particularly unsafe. Since these bypass database-specific code for safe handling of strings, many such applications will need to be re-written to become secure."
  
* '''[http://www.cioupdate.com/article.php/3608391 Oracle teaches developers security]''' - "These classes generate results: There are many examples of developers who identified and fixed security bugs in their own code after taking the security training class."
+
* '''[http://www.cioupdate.com/article.php/3608391 Oracle teaches developers security]''' - "We track the security training completion status of each developer and provide regular reports on training compliance to development management and to senior corporate management to ensure a level of security training is maintained in each organization."
  
 
<!--
 
<!--
 
* '''[http://link Snarky headline]''' - "Quote"
 
* '''[http://link Snarky headline]''' - "Quote"
 
-->
 
-->

Revision as of 21:45, 24 May 2006

  • Custom escaping considered harmful - "Applications using 'ad-hoc methods to "escape" strings going into the database, such as regexes, or PHP3's addslashes() and magic_quotes' are particularly unsafe. Since these bypass database-specific code for safe handling of strings, many such applications will need to be re-written to become secure."
  • Oracle teaches developers security - "We track the security training completion status of each developer and provide regular reports on training compliance to development management and to senior corporate management to ensure a level of security training is maintained in each organization."