Newsletter sign-up
View all newsletters

Enterprise Java Newsletter
Stay up to date on the latest tutorials and Java community news posted on JavaWorld

Sponsored Links

Optimize with a SATA RAID Storage Solution
Range of capacities as low as $1250 per TB. Ideal if you currently rely on servers/disks/JBODs

Secure your Java apps from end to end, Part 2

Don't let flaws compromise application security

  • Print
  • Feedback

Page 4 of 4

The fix: immediately copy the two input arrays and operate on the copies instead of the originals.

Return to best practices

You can detect many flaws that lead to security vulnerabilities through good old-fashioned software development best practices. Clear requirements, formal design reviews, formal code reviews, and thorough testing will uncover many flaws and improve overall software quality.

Next month, I will explore the final security context: network security.

About the author

Todd Sundsted has been writing programs since computers became available in desktop models. Though originally interested in building distributed applications in C++, Todd moved on to the Java programming language when it became the obvious choice for that sort of thing. In addition to writing, Todd is cofounder and chief architect of PointFire, Inc.

Read more about Tools & Methods in JavaWorld's Tools & Methods section.

  • Print
  • Feedback

Resources