The Perl Jam 2: The Camel Strikes Back (32c3) https://www.youtube.com/watch?v=eH_u3C2WwQ0
Link to discussion of last year's talk: 1111750
I cringed the first talk, but it seems like this talk is more productive. Summary:
- Hashes and arrays are considered "secure" (???)
- SQL injections happen when you don't sanitize input (not exactly groundbreaking)
- Results from various CGI-like modules are not standardized
- Real bug in example CGI.pm code
- <> does strange things when given something other than a file (strange to anyone who hasn't memorized the camel book)
- open() creates a file descriptor unless it's used with | in which case it executes
I sincerely hope there will not be a Stop Using Perl pt 3. I can only handle someone complaining about list flattening for so long.
Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
Titles consisting of a single word are discouraged, and in most cases are disallowed outright.
Read Where should I post X? if you're not absolutely sure you're posting in the right place.
Please read these before you post! —
Posts may use any of the Perl Monks Approved HTML tags:
You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
- a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
Link using PerlMonks shortcuts! What shortcuts can I use for linking?
See Writeup Formatting Tips and other pages linked from there for more info.
| & || & |
| < || < |
| > || > |
| [ || [ |
| ] || ] ||