Security Code Review Guidelines
187abefd2333cdc9281a85c2b342ca0969f512e1c3675ee036f6c28f8da35071
A very thorough and well written paper describing raw socket programming entitled "An overview of raw socket programming with FreeBSD - Chapter I: Transport Control Protocol".
5328dd0dea4544d1c2163bdee82fd29da1afc5e35ff3273f7f5a411e490c6288
Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.
e235c26539ac8a622e503b130f1fea2dec6c57ae8c0f9b6cd3ed0564bfe69c95
Coding a TCP Connect Port Scanner Using VLSM - Handbook three in a series. An in-depth beginners tutorial written to explain incorporation of VLSM and CIDR capabilities into a network scanner.
37beb0c660c6d22bad13b4a8d700e977e49e7010171643b7a25dbf35c1cb6012
Coding with the DNS protocol v2 - Includes DNS basics, How to decode DNS packets by hand, Parsing DNS replies, advanced DNS techniques, and DNS Security Mechanisms. Well written, contains lots of in depth information and example code.
4dd89f0ca3b69db69a2564df1a08db8f2c87d8bfc8d824966fcf1f0bf5dd7a76
Exile 2000 International Coding Team. Documentation about native raw socket programming.
ca82664b05cae82e6ef3f5ce15318146d5dd3596467fc2c0dd90043411341f95
Electric Fence stops your program on the exact instruction that overruns (or underruns) a malloc() memory buffer. GDB will then display the source-code line that causes the bug. It works by using the virtual-memory hardware to create a red-zone at the border of each buffer - touch that, and your program stops. Catch all of those formerly impossible-to-catch overrun bugs that have been bothering you for years.
e5be3a38a0d2b71ba558eb310a2db44ea6e7c208e16d4fd907dc6ed11c46b1a7
Easy TcpIp Library adds basic TCP/UDP/ICMP/IP support to your applications by simply linking it in. You can write servers, clients, send/receive data and send/receive/dump/analyze packets.
a429380d33f5e21aebe644edcccbe0c6b1660254f495910297cd42668be11ee6
Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.
c49cd25eebd1db8f427ebdbdf7fcec255bce3bcdea3f7f433d77f240fa31ee01
"How to Write a Setuid Program" M. Bishop
c6a25468858ef75f20f7a3f29be45870bdda6323c666429c4bd1d8996f9d561a
"Robust Programming" M. Bishop
2e46f8efc139e9fd51c49152041a4569c14775bd26def18400ebdf08cded7f5a
up2lo - rename files from uppercase to lower case.
f0497c3a160179913a8a3db99ec85cc0f908f6e7344640e85132ac49a2861979
"UNIX Security: Security in Programming" M. Bishop
fb294ab479522382c61676f5eb0d997edef95640249e9a9a779dc9d12b9d22d0
"Writing Safe Privileged Programs" M. Bishop
97207a319d013b1bd518f61f44ec91dea8a8307825e65db02ba9385fde60a3d4
Designing secure software
7ea4b48c6411c2d4ab92386be6cae3f491251b798d326776e87459943ca68e53
Secure UNIX Programming FAQ v0.5 (html) - This FAQ answers questions about secure programming in the UNIX environment. It is a guide for programmers and not administrators.
58936ab74622fab63facbd8736c54a49e72dc451ae713a0657e806eb833d9dcd
Secure UNIX Programming FAQ v0.5 (txt) - This FAQ answers questions about secure programming in the UNIX environment. It is a guide for programmers and not administrators.
ccbd31a12194c1c6809c413ef164945c8055e28f9c9be102d7721c1b2e3da8d8
Socket Talk v1.8 Net programming tutorial - If you want to learn how to code with sockets, this is the program for you. Socket Talk is a small development environment to mess with sockets. You can send sockets calls and get help on how to code them. X-Window GUI and command line versions included.
30d0f0712e0a869135ba92b70ebcfca1ab3286d6664619d86093359beb996807
The Unix Secure Programming FAQ
b308fbcf9fdf3746d45b770d5c0b9695f189dcd2c5d11121121ed64a90de677b
A nice explanation of the use of the RGB triplet or color name.
3b3eda657dd5b60776929ddd62c1b3c142e9c8d1fccaad7fb90199dc45daf9c4