The problem with using the popen function in servers is

A. popen can run arbitrary shell commands
B. the server has to call the pclose function to prevent zombies


A. popen can run arbitrary shell commands

Computer Science & Information Technology

You might also like to view...

Which of the following is false?

a) The two most common HTTP request types (also known as request methods) are get and post. b) Both get and post requests send form data to the server as part of the URL. c) An HTTP request often sends data to a server-side form handler that processes the data. d) A ? separates the query string from the rest of the URL in a get request.

Computer Science & Information Technology

When using a Microsoft Access database, select the ________ option under the Provider tab of the Data Link Properties dialog.

a) Microsoft Jet 4.0 OLE DB Provider b) Microsoft OLE DB Provider for Oracle c) Microsoft OLE DB Simple Provider d) Microsoft OLE DB Provider for Access e) None of the above.

Computer Science & Information Technology

If a number is the highest possible exponent to which a number can belong, it is referred to as a _________ of n.

A) ?primitive root B) ?composite ? C) ?discrete logarithm D) ?bijection

Computer Science & Information Technology

__________ image files compresses them without losing significant visual information.

A. Validating B. Cropping C. Optimizing D. Minifying

Computer Science & Information Technology