Chapter 3. Secure Programming

Contributed by Murray Stokely.
Table of Contents
3.1. Synopsis
3.2. Secure Design Methodology
3.3. Buffer Overflows
3.4. SetUID issues
3.5. Limiting your program's environment
3.6. Trust
3.7. Race Conditions

3.1. Synopsis

This chapter describes some of the security issues that have plagued UNIX® programmers for decades and some of the new tools available to help programmers avoid writing exploitable code.

All FreeBSD documents are available for download at http://ftp.FreeBSD.org/pub/FreeBSD/doc/

Questions that are not answered by the documentation may be sent to <[email protected]>.
Send questions about this document to <[email protected]>.