what will he be able to prevent?
Carl is writing cgi-bin scripts in PERL for some web pages. He is concerned about malicious
users trying to exploit the site and/or the cgi-sripts. If Carl uses the following code, what will he be
able to prevent?
$filename =~ s/[^A-Za-z0-9_-.//g
what port must be opened on the firewalls so that the SSL LDAP traffic can pass through?
Gregory is a system administrator who oversees 15 Mac OS X servers for his company.
Three of his servers are at remote sites, but they still need to replicate and communicate with the
servers at the main office. Gregory wants to use SSL to protect the LDAP traffic between all
servers for security. For this to work properly, what port must be opened on the firewalls so that
the SSL LDAP traffic can pass through?
What is the following shellcode trying to accomplish?
What is the following shellcode trying to accomplish?
int main(void) {
mkdir(“A”);
chdir(“A”);
chroot(“..//..//..//..//..//..//..//..//”);
system(“/bin/sh”)
What coould a developer using Apple’s Cocoa accomplish by using the following script?
What coould a developer using Apple’s Cocoa accomplish by using the following script?
NSURL *MyURL = [NSURL URLWithString:@”http://www.apple.com/”];
NSURL *urlContents = [myURL resourceDataUsingCache:YES];
if ([urlContents writeToFile:[@”~/Documents/applewebsite.html”
stringByExpandingTildeInPath]
atomically:YES])
{
// It was successful, do stuff here
} else {
// There was a problem writing the file
}
What is one of the dominant factors that lead to insecure programming?
What is one of the dominant factors that lead to insecure programming?
What is this process called where illegal copies are released to the public along with the legal versions?
Although software companies despise software piracy, they often realize that illegal release of
their product parallel to the legal release can actually increase the item’s user base. These illegal
versions of the software can oftentimes increase actual legal buyers. What is this process called
where illegal copies are released to the public along with the legal versions?
What type of authentication is used in the following Pocket SOAP code?
What type of authentication is used in the following Pocket SOAP code?
Dim Envelope
Dim HTTP
Set Envelope = CreateObject(“PocketSOAP.Envelope.2”)
Set HTTP = CreateObject(“PocketSOAP.HTTPTransport.2)
Envelope.SetMethod “GetSome”, “http://www.mysite.org/message/”
Emvelope.Parameters.Create “SomeParameter”, “SomeValue”
HTTP.SOAPAction = “http://www.mysite.org/action/Service.GetSome”
HTTP.Authentication “Username”, “Password”
HTTP.Send http://www.mysite.org/webservice.WDSL”,Envelope.Serialize
Envelope.Parse HTTP
MsgBox “Result: ” & Envelope.Parameters.Item(0).Value
What function can be used with SQL to encrypt user supplied-passwords to that they can be compared with the en
What function can be used with SQL to encrypt user supplied-passwords to that they can be
compared with the encrypted passwords stored on the SQL server?
What SQL stored procedure could Darren use to remove user accounts from the databases?
Darren has just been hired on as the SQL dba for Fredrickson Inc., a marketing firm in New York
City. He has been asked to clearn up the SQL databases on one of the servers. What SQL stored
procedure could Darren use to remove user accounts from the databases?
What encryption algorithm is used by PERL crypt() function?
What encryption algorithm is used by PERL crypt() function?