cm0002@lemmy.world to Technology@lemmy.worldEnglish · 2 days agoLife isn't easy if your last name is 'Null' as it still breaks database entries the world overwww.pcgamer.comexternal-linkmessage-square73fedilinkarrow-up1393arrow-down16
arrow-up1387arrow-down1external-linkLife isn't easy if your last name is 'Null' as it still breaks database entries the world overwww.pcgamer.comcm0002@lemmy.world to Technology@lemmy.worldEnglish · 2 days agomessage-square73fedilink
minus-squarePoolloverNathan@programming.devlinkfedilinkEnglisharrow-up2·8 hours ago(to make the joke more obvious) The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.
(to make the joke more obvious)
The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.