Click here to Skip to main content
12,754,017 members (31,726 online)
Click here to Skip to main content

Stats

49.5K views
28 bookmarked
Posted 12 Oct 2006

Security Tips for Temporary File Usage in Applications

, 12 Oct 2006
Educate yourself on security best practices for temporary file usage in software applications.

Revisions


  

Compare Revision Minor Date Status Editor
1 - publicly available No 12-Oct-06 17:09 Available Smitha Nishant

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here

Share

About the Author

Richard Lewis
Web Developer
India India
I am a Software Security Consultant and specialize in secure code and design reviews. It is my career ambition to build a security fabric for secure software development. I have a programming background in C, C++, device drivers and MFC. I have done a couple of PKI deployments and have also developed a desktop encryptor, authentication SDK and cryptographic SDK.

I believe I am what I am because I choose God to make me what He wants me to be.

You may also be interested in...

Pro
Pro
Permalink | Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.170217.1 | Last Updated 13 Oct 2006
Article Copyright 2006 by Richard Lewis
Everything else Copyright © CodeProject, 1999-2017
Layout: fixed | fluid