site Search Results
Results for: herb sutter a false sense of security
Order the NEW
Discounted Dr. Dobb's Developer Library DVD 6
Purchase the fully searchable DVD for $59.95 - a 60% discount! Features
21 years of Dr. Dobb's Journal, 15 years of Sys Admin
magazine, 14+ years of C/C++ Users Journal, 1 year worth of Dr.
Dobb's Digest, podcasts, videos and more! Order Now.
Data Signing and Encryption in VB
Concern for security on Windows platforms has never been higher. Bjarke covers electronic signatures handled through VB-based GUI and batch applications. These signatures have two functions: Ensure that data is unmodified and verify the identity of the signer. The article also covers using smart cards and data encryption.
The Group of Seven - Extensions under Consideration for the C++ Standard Library
In this month's column, we visit the "Group of Seven. No, not the Canadian artists, but rather the first group of seven suggested C++ Standard library extensions considered at the most recent standards meeting in October 2001.
Conversations: To Sleep, Perchance
Just how many threading and streaming mistakes can arise in one poor little dozen-line function? Quite a few, and that's not even counting the magic... The effects of sleep deprivation can have an astonishing effect on the clarity of one's code.
To Catch a Thief
Even the most elaborate security measures are no guarantee against network intrusions. When the unthinkable happens, well-defined procedures for gathering and preserving evidence can help you take action.
Avoid Confusing Messages Caused by Password Filters
Password filtering in Windows NT and Windows 2000 allows you to set rules to ensure users select secure passwords. In some cases, the password filtering can cause an irritating error message, but you can take steps to avoid it. Manfred reviews how password filtering works and provides a DLL to improve it.
From Mechanism to Method:The Safe Stacking of Cats
What can you do with a cat? Many things, perhaps the most surprising of which (not least to the cat) is to stack it. However, not all attempts at cat stacking are successful. This column explores the safety aspect of such antics in C++: What are the levels of exception safety that we can assume? By what means can we achieve exception safety? What are the five different approaches to cat stacking? What are their relative merits and drawbacks?
Extensible Templates: Via Inheritance or Traits?
Traits classes have become de rigueur in C++ template programming. Read this to find out why.
Programming with Perl | Ravaged by Robots!
In last month's column, I talked about implementing one type of survey form for customer feedback. Other types of forms often have ratings systems or multiple-choice values, which are then summarized into an average score to determine the most frequent responses.
Applying .Net to Web Services (Web Techniques, May 2001)
As long as it has been possible to connect two computers, programmers have built software that communicates over the network. Most of this communication is facilitated by protocols, which standardize and formalize the way information is exchanged among various applications. Protocols that hide the low-level network plumbing make lazy developers like me very happy, because they require less work and offer more reward.
Programming with Perl | Archiving and Compression with CGI (Web Techniques, Aug
Tens of thousands of compressed tar archives probably exist out there on the Web to download. I can't imagine how much time, even on a high speed connection, it would take to download them all. A major problem with compressed archives, whether tar, zip, or otherwise, is that even if the publisher of the information has carefully bundled only the most important files, sometimes I really want only part of the data. However, I'm forced to download the entire thing (perhaps over a slow connection in a hotel room, as I often am), to discard only the parts I don't want.