Click here to Skip to main content
15,867,686 members
Everything / Programming Languages / Perl

Perl

Perl

Great Reads

by Omar Al Zabir
Protect ASP.NET and WCF from various brute force and Denial of Service attacks and speed up response time using nginx.
by Oscar-Tark
If you are looking into white hat hacking, it's good to know old school tactics used for overflows.
by Oscar-Tark
In this article, we will be looking at a more advanced version of a buffer overflow attack.
by anshulskywalker
Understanding of Example Based Machine Translation (EBMT) system and how to create your own using exisiting tools

Latest Articles

by Paul Aurelian Gagniuc
This article shows how to mix two signals into a third, in variable proportions.
by Oscar-Tark
In this article, we will be looking at a more advanced version of a buffer overflow attack.
by Oscar-Tark
A basic formatted string exploit shows you how small errors in programming with the printf function can be a lethal weapon for hackers looking to compromise a system.
by Shameel
Part 2 of this multi-part article series compares SQL Server and PostgreSQL article, database structure, language differences, data type mappings, functions and operators and other important considerations for migration..

All Articles