Deck 9: Secure Programming With Perl

ملء الشاشة (f)
exit full mode
سؤال
8)The main purpose of ____ is to isolate tainted data so that the script cannot use it to perform tasks unintentionally.

A) safe mode
B) taint mode
C) sandbox mode
D) domain mode
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
12)In Perl, the ternary conditional operator "____" is an exception to the principle of "one tainted value taints the whole expression."

A) ++
B) ?:
C) *=
D) &&
سؤال
10)Perl's ____ allows developers program security even when running extra privileges such as setuid or setgid programs.

A) taint mode
B) safe mode
C) domain mode
D) sandbox mode
سؤال
19)The goal of the ____ library is to provide classes and functions that allow developers to write WWW clients.

A) LWP
B) CPAN
C) WWP
D) perl-weblib
سؤال
17)____ is an algorithm based on a random permutation using a variable key-size stream cipher with byte-oriented operations.

A) RC4
B) SHA1
C) MD5
D) RSA
سؤال
18)____ is a set of Perl modules that provide a simple and consistent Application Programming Interface (API) to the World Wide Web.

A) Crypt::Web:Lib
B) RC4
C) Crypt::Lib:Web
D) LWP
سؤال
6)____ is a general-purpose scripting language that is widely used to implement common gateway interface (CGI).

A) Java
B) Python
C) Ruby
D) Perl
سؤال
1)Hypertext transfer protocol (HTTP) only allows one-way communication from the server to the client (Web browser).
سؤال
16)The Perl's ____ function is based on the data encryption standard (DES) algorithm, and its variations are intended to discourage the use of hardware implementations of a key search.

A) des()
B) crypt()
C) password()
D) passwd()
سؤال
3)In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.
سؤال
15)____ is a search engine for the distributions, modules, documentation, and IDs on CPAN.

A) Perl search
B) Google-Perl
C) Google.CPAN
D) CPAN search
سؤال
4)Once a variable is tainted, Perl will allow you to use it in a system() , exec() , piped open, eval() , backtick , or unlink command.
سؤال
2)Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.
سؤال
9)The setuid and ____ are UNIX functions that deal with privileges.

A) setdid
B) setoid
C) setgid
D) setprv
سؤال
7)____ permits communication and interaction from the client to the server for producing dynamic, two-way Web pages.

A) CGI
B) HTTP
C) HTTPS
D) HTTP2
سؤال
13)____ is a tool designed to help developers to write safer scripts by forcing them to think about external input validation and protecting them from accidentally performing unsafe operations, such as unwillingly changing external resources.

A) Safe mode
B) Sandbox mode
C) Domain mode
D) Taint mode
سؤال
14)Variables are considered ____ if they are set with values that are retrieved from outside of the script.

A) sandboxed
B) secure
C) tainted
D) safe
سؤال
20)Communication in LWP follows hypertext transfer protocol (HTTP) and is ____.

A) stateful
B) stateless
C) state-aware
D) state-smart
سؤال
11)You can enable taint mode explicitly by using the command line flag ____.

A) -A
B) -S
C) -T
D) -X
سؤال
5)It is a good practice to verify that a variable you are planning to untaint has only bad characters (black listing) rather than check whether or not it has any good characters (white listing).
سؤال
38)Briefly describe the Perl's crypt() function.
سؤال
29)The _________________________ module enables a Perl program to use OpenSSL to parse an X.509-formatted certificate.
سؤال
28)Perl provides a built-in security-checking mechanism called ____________________.
سؤال
39)What are the steps followed by a communication in LWP?
سؤال
40)What are the characteristics of a namespace when Perl is in safe mode?
سؤال
33)What are some of the characteristics of Perl's taint mode?
سؤال
25)The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.

A) reval (STRING)
B) deny_only (OP, ...)
C) share (NAME, ...)
D) varglob (VARNAME)
سؤال
22)____ provides internal data checking for developers to catch malicious data coming into the program.

A) Taint mode
B) Domain mode
C) Sandbox mode
D) Safe mode
سؤال
24)The safe module operation ____ permits only the provided list of operators to be used when compiling code in the compartment.

A) permit (OP, ...)
B) permit_only (OP, ...)
C) trap (OP, ...)
D) share (NAME, ...)
سؤال
26)The two areas of concern in file processing are temporary file creation and ____ in file access.

A) covert channels
B) side channels
C) race conditions
D) share conditions
سؤال
37)How can you set values for a variable in Perl?
سؤال
36)How can you untaint Perl variables?
سؤال
23)In Perl, ____ provides a "sandbox" environment that compiles and executes code in restricted compartments.

A) taint module
B) taint mode
C) safe module
D) domain mode
سؤال
31)In Perl, the RSA public key cryptography functions can be accessed through the _________________________ module.
سؤال
21)In order to provide support for the HTTPS protocol under LWP, we need the ____ Perl module.

A) LWP::UserAgent
B) Crypt::HTTPS
C) Crypt::SSLeay
D) Crypt::SSLAgent
سؤال
30)The ____________________ function is a built-in Perl routine usually used as the UNIX password-encryption function.
سؤال
34)What are some of the Perl's taint mode exceptions?
سؤال
27)Many programming languages can be used for building CGI, but the most common one is ____________________.
سؤال
35)How can you test whether a variable that contains tainted data will trigger an "Insecure dependency" message?
سؤال
What are the operator-access restrictions when Perl is in safe mode?
سؤال
Match between columns
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CPAN
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::RSA
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::X509
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CGI
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
LWP
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
PATH
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Taint mode
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
setuid
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
RC4
environment variable that can be used by a Perl program
CPAN
environment variable that can be used by a Perl program
Crypt::OpenSSL::RSA
environment variable that can be used by a Perl program
Crypt::OpenSSL::X509
environment variable that can be used by a Perl program
CGI
environment variable that can be used by a Perl program
LWP
environment variable that can be used by a Perl program
PATH
environment variable that can be used by a Perl program
Taint mode
environment variable that can be used by a Perl program
setuid
environment variable that can be used by a Perl program
RC4
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CPAN
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::RSA
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::X509
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CGI
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
LWP
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
PATH
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Taint mode
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
setuid
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
RC4
also referred to as the "libwww-perl" collection
CPAN
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::RSA
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::X509
also referred to as the "libwww-perl" collection
CGI
also referred to as the "libwww-perl" collection
LWP
also referred to as the "libwww-perl" collection
PATH
also referred to as the "libwww-perl" collection
Taint mode
also referred to as the "libwww-perl" collection
setuid
also referred to as the "libwww-perl" collection
RC4
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CPAN
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::RSA
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::X509
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CGI
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
LWP
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
PATH
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Taint mode
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
setuid
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
RC4
a central Web repository for Perl modules and extensions
CPAN
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::RSA
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::X509
a central Web repository for Perl modules and extensions
CGI
a central Web repository for Perl modules and extensions
LWP
a central Web repository for Perl modules and extensions
PATH
a central Web repository for Perl modules and extensions
Taint mode
a central Web repository for Perl modules and extensions
setuid
a central Web repository for Perl modules and extensions
RC4
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CPAN
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::RSA
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::X509
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CGI
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
LWP
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
PATH
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Taint mode
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
setuid
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
RC4
a specification for exchanging information between a Web server and an application program
CPAN
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::RSA
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::X509
a specification for exchanging information between a Web server and an application program
CGI
a specification for exchanging information between a Web server and an application program
LWP
a specification for exchanging information between a Web server and an application program
PATH
a specification for exchanging information between a Web server and an application program
Taint mode
a specification for exchanging information between a Web server and an application program
setuid
a specification for exchanging information between a Web server and an application program
RC4
a stream cipher designed by Ron Rivest for RSA Data Security
CPAN
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::RSA
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::X509
a stream cipher designed by Ron Rivest for RSA Data Security
CGI
a stream cipher designed by Ron Rivest for RSA Data Security
LWP
a stream cipher designed by Ron Rivest for RSA Data Security
PATH
a stream cipher designed by Ron Rivest for RSA Data Security
Taint mode
a stream cipher designed by Ron Rivest for RSA Data Security
setuid
a stream cipher designed by Ron Rivest for RSA Data Security
RC4
سؤال
42)Briefly describe race conditions in file access.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Secure Programming With Perl
1
8)The main purpose of ____ is to isolate tainted data so that the script cannot use it to perform tasks unintentionally.

A) safe mode
B) taint mode
C) sandbox mode
D) domain mode
B
2
12)In Perl, the ternary conditional operator "____" is an exception to the principle of "one tainted value taints the whole expression."

A) ++
B) ?:
C) *=
D) &&
B
3
10)Perl's ____ allows developers program security even when running extra privileges such as setuid or setgid programs.

A) taint mode
B) safe mode
C) domain mode
D) sandbox mode
A
4
19)The goal of the ____ library is to provide classes and functions that allow developers to write WWW clients.

A) LWP
B) CPAN
C) WWP
D) perl-weblib
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
17)____ is an algorithm based on a random permutation using a variable key-size stream cipher with byte-oriented operations.

A) RC4
B) SHA1
C) MD5
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
18)____ is a set of Perl modules that provide a simple and consistent Application Programming Interface (API) to the World Wide Web.

A) Crypt::Web:Lib
B) RC4
C) Crypt::Lib:Web
D) LWP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
6)____ is a general-purpose scripting language that is widely used to implement common gateway interface (CGI).

A) Java
B) Python
C) Ruby
D) Perl
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
1)Hypertext transfer protocol (HTTP) only allows one-way communication from the server to the client (Web browser).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
16)The Perl's ____ function is based on the data encryption standard (DES) algorithm, and its variations are intended to discourage the use of hardware implementations of a key search.

A) des()
B) crypt()
C) password()
D) passwd()
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
3)In Perl, any subexpression is considered tainted if all of the elements in the expression are tainted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
15)____ is a search engine for the distributions, modules, documentation, and IDs on CPAN.

A) Perl search
B) Google-Perl
C) Google.CPAN
D) CPAN search
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
4)Once a variable is tainted, Perl will allow you to use it in a system() , exec() , piped open, eval() , backtick , or unlink command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
2)Since CGI scripts are designed to run by individuals around the world, they are the prime targets for malicious users to exploit any vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
9)The setuid and ____ are UNIX functions that deal with privileges.

A) setdid
B) setoid
C) setgid
D) setprv
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
7)____ permits communication and interaction from the client to the server for producing dynamic, two-way Web pages.

A) CGI
B) HTTP
C) HTTPS
D) HTTP2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
13)____ is a tool designed to help developers to write safer scripts by forcing them to think about external input validation and protecting them from accidentally performing unsafe operations, such as unwillingly changing external resources.

A) Safe mode
B) Sandbox mode
C) Domain mode
D) Taint mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
14)Variables are considered ____ if they are set with values that are retrieved from outside of the script.

A) sandboxed
B) secure
C) tainted
D) safe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
20)Communication in LWP follows hypertext transfer protocol (HTTP) and is ____.

A) stateful
B) stateless
C) state-aware
D) state-smart
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
11)You can enable taint mode explicitly by using the command line flag ____.

A) -A
B) -S
C) -T
D) -X
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
5)It is a good practice to verify that a variable you are planning to untaint has only bad characters (black listing) rather than check whether or not it has any good characters (white listing).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
38)Briefly describe the Perl's crypt() function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
29)The _________________________ module enables a Perl program to use OpenSSL to parse an X.509-formatted certificate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
28)Perl provides a built-in security-checking mechanism called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
39)What are the steps followed by a communication in LWP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
40)What are the characteristics of a namespace when Perl is in safe mode?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
33)What are some of the characteristics of Perl's taint mode?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
25)The safe module operation ____ returns a glob reference for the symbol table entry of VARNAME in the package of the compartment.

A) reval (STRING)
B) deny_only (OP, ...)
C) share (NAME, ...)
D) varglob (VARNAME)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
22)____ provides internal data checking for developers to catch malicious data coming into the program.

A) Taint mode
B) Domain mode
C) Sandbox mode
D) Safe mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
24)The safe module operation ____ permits only the provided list of operators to be used when compiling code in the compartment.

A) permit (OP, ...)
B) permit_only (OP, ...)
C) trap (OP, ...)
D) share (NAME, ...)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
26)The two areas of concern in file processing are temporary file creation and ____ in file access.

A) covert channels
B) side channels
C) race conditions
D) share conditions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
37)How can you set values for a variable in Perl?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
36)How can you untaint Perl variables?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
23)In Perl, ____ provides a "sandbox" environment that compiles and executes code in restricted compartments.

A) taint module
B) taint mode
C) safe module
D) domain mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
31)In Perl, the RSA public key cryptography functions can be accessed through the _________________________ module.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
21)In order to provide support for the HTTPS protocol under LWP, we need the ____ Perl module.

A) LWP::UserAgent
B) Crypt::HTTPS
C) Crypt::SSLeay
D) Crypt::SSLAgent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
30)The ____________________ function is a built-in Perl routine usually used as the UNIX password-encryption function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
34)What are some of the Perl's taint mode exceptions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
27)Many programming languages can be used for building CGI, but the most common one is ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
35)How can you test whether a variable that contains tainted data will trigger an "Insecure dependency" message?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the operator-access restrictions when Perl is in safe mode?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CPAN
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::RSA
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Crypt::OpenSSL::X509
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
CGI
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
LWP
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
PATH
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
Taint mode
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
setuid
considered a Perl extension to OpenSSL's X.509 API and implements most of OpenSSL's useful X.509 API
RC4
environment variable that can be used by a Perl program
CPAN
environment variable that can be used by a Perl program
Crypt::OpenSSL::RSA
environment variable that can be used by a Perl program
Crypt::OpenSSL::X509
environment variable that can be used by a Perl program
CGI
environment variable that can be used by a Perl program
LWP
environment variable that can be used by a Perl program
PATH
environment variable that can be used by a Perl program
Taint mode
environment variable that can be used by a Perl program
setuid
environment variable that can be used by a Perl program
RC4
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CPAN
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::RSA
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Crypt::OpenSSL::X509
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
CGI
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
LWP
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
PATH
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
Taint mode
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
setuid
a collection of specific restrictions in Perl that helps developers to write safer scripts by forcing them to think more carefully about how data is used within the script
RC4
also referred to as the "libwww-perl" collection
CPAN
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::RSA
also referred to as the "libwww-perl" collection
Crypt::OpenSSL::X509
also referred to as the "libwww-perl" collection
CGI
also referred to as the "libwww-perl" collection
LWP
also referred to as the "libwww-perl" collection
PATH
also referred to as the "libwww-perl" collection
Taint mode
also referred to as the "libwww-perl" collection
setuid
also referred to as the "libwww-perl" collection
RC4
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CPAN
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::RSA
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Crypt::OpenSSL::X509
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
CGI
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
LWP
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
PATH
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
Taint mode
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
setuid
mostly used to allow users to run binary executables with temporarily elevated privileges in order to perform specific tasks
RC4
a central Web repository for Perl modules and extensions
CPAN
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::RSA
a central Web repository for Perl modules and extensions
Crypt::OpenSSL::X509
a central Web repository for Perl modules and extensions
CGI
a central Web repository for Perl modules and extensions
LWP
a central Web repository for Perl modules and extensions
PATH
a central Web repository for Perl modules and extensions
Taint mode
a central Web repository for Perl modules and extensions
setuid
a central Web repository for Perl modules and extensions
RC4
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CPAN
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::RSA
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Crypt::OpenSSL::X509
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
CGI
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
LWP
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
PATH
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
Taint mode
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
setuid
provides an interface to the RSA key-generation, signing, and verification functions in OpenSSL
RC4
a specification for exchanging information between a Web server and an application program
CPAN
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::RSA
a specification for exchanging information between a Web server and an application program
Crypt::OpenSSL::X509
a specification for exchanging information between a Web server and an application program
CGI
a specification for exchanging information between a Web server and an application program
LWP
a specification for exchanging information between a Web server and an application program
PATH
a specification for exchanging information between a Web server and an application program
Taint mode
a specification for exchanging information between a Web server and an application program
setuid
a specification for exchanging information between a Web server and an application program
RC4
a stream cipher designed by Ron Rivest for RSA Data Security
CPAN
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::RSA
a stream cipher designed by Ron Rivest for RSA Data Security
Crypt::OpenSSL::X509
a stream cipher designed by Ron Rivest for RSA Data Security
CGI
a stream cipher designed by Ron Rivest for RSA Data Security
LWP
a stream cipher designed by Ron Rivest for RSA Data Security
PATH
a stream cipher designed by Ron Rivest for RSA Data Security
Taint mode
a stream cipher designed by Ron Rivest for RSA Data Security
setuid
a stream cipher designed by Ron Rivest for RSA Data Security
RC4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)Briefly describe race conditions in file access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.