cm0002@lemmy.world to Technology@lemmy.worldEnglish · 2 days agoLife isn't easy if your last name is 'Null' as it still breaks database entries the world overwww.pcgamer.comexternal-linkmessage-square67fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLife isn't easy if your last name is 'Null' as it still breaks database entries the world overwww.pcgamer.comcm0002@lemmy.world to Technology@lemmy.worldEnglish · 2 days agomessage-square67fedilink
minus-squareGonzako@lemmy.worldlinkfedilinkEnglisharrow-up0·2 days agoHow do devs make off by one mistakes.
minus-squaresugar_in_your_tea@sh.itjust.workslinkfedilinkEnglisharrow-up0·21 hours agoThe most common source of security vulnerabilities is memory corruption and off by one errors.
minus-squarePoolloverNathan@programming.devlinkfedilinkEnglisharrow-up0·17 hours ago(to make the joke more obvious) The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.
How do devs make off by one mistakes.
The most common source of security vulnerabilities is memory corruption and off by one errors.
(to make the joke more obvious)
The two most common sources of security vulnerabilities are buffer overflows, use-after-free, and off-by-one errors.