What are some of the characteristics of Perl's taint mode?

What will be an ideal response?


The following is a list of taint mode characteristics:
* Perl will verify that path directories are not writable by others.
* A tainted Perl program cannot use data derived from outside of the program to affect something else outside the program.
* All command line arguments, file input, environment variables, locale information, results of sensitive system calls-such as readdir(), readlink(), the variable of shmread(), the messages returned by msgrcv(), the password, gcos, and shell fields returned by the getpwxxx() calls-are marked as "tainted" when Perl is in taint mode.
* Tainted data cannot be used directly or indirectly in any command that invokes a subshell or in any command that will modify files, directories, or processes.
* If a Perl expression contains tainted data, any subexpression is considered tainted, even if the value of the subexpression is not itself affected by the tainted data. In other words, one tainted value taints the whole expression.

Computer Science & Information Technology

You might also like to view...

When you declare a class, a variable, a constant, or a method, you are telling the Java compiler that word's ____ in the program.

A. position B. status C. meaning D. path

Computer Science & Information Technology

The portion of a security policy that describes who responds when there has been a security breach is called the ______________ response section.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can add Visual Basic for Applications (VBA) code to a form in ________ view

A) Print Preview B) Design View C) Layout View D) Report View

Computer Science & Information Technology

Removable screens are used to

A) Give more flexibility when cleaning or repairing B) Show a movie to a crowd of people C) Be able to clean the keyboard more easily D) Show others something on the display

Computer Science & Information Technology