https://m.businesstoday.in/lite/story/tim-cook-apple-ceo-says-4-year-degree-not-necessary-coding/1/345666.html?
مدیر اپل: برای برنامه نویس شدن لازم نیست ۴ سال دانشگاه برید
مدیر اپل: برای برنامه نویس شدن لازم نیست ۴ سال دانشگاه برید
Business Today
Apple CEO Tim Cook says 4-year degree not necessary for coding
That's the opinion of Apple CEO Tim Cook, who made the statement earlier this week while visiting an Apple Store in Orlando, Florida, to meet 16-year-old Liam Rosenfeld. Rosenfeld is one of the 350 scholarship winners who will be attending Apple's annual…
Code injection
در زبان c تکنیکی است از آن در مشکل امنیتی اخیر whatapps بهره گرفت اند.
یک توضیح ساده درباره آن
در زبان c اندیس ارایه ها چک نمیشود. بنابراین میتوان یک کد مخرب را درون بخش از حافظه قرار داد و با تغییر بخشی از حافظه که عمل jump را انجام میدهد کد مخرب را اجرا کرد !
در زبان c تکنیکی است از آن در مشکل امنیتی اخیر whatapps بهره گرفت اند.
یک توضیح ساده درباره آن
در زبان c اندیس ارایه ها چک نمیشود. بنابراین میتوان یک کد مخرب را درون بخش از حافظه قرار داد و با تغییر بخشی از حافظه که عمل jump را انجام میدهد کد مخرب را اجرا کرد !
For example, when a function is called the program (code inserted by the compiler) must store the address of the instruction to return to. So if this is the 32 bit word just before the beginning of the stack, one could do:
void foo() {
int array[5];
int var = 0;
int var2 = 0; // read in user input
printf("Enter index and value to write:");
scanf("%i", var);
scanf("%i", var2);
// malicious user might set var to -1 and var2 to an address to execute
// if say the 32-bit value before the stack variables is the instruction to // return to
array[var] = var2
// return now goes to malicious code
}
یعنی در انتهای این تابع یک دستور return وجود دارد که توسط کامپایلر به یک آدرس که این تابع را فراخوانی کرده است بر میگردد ما با تغییر این بخش از حافظه به کد مخرب پرش میکنیم و کد را اجرا میکنیم!
یک مثال برای Buffer Overflow Attack
https://www.thegeekstuff.com/2013/06/buffer-overflow/?utm_source=feedly
https://www.thegeekstuff.com/2013/06/buffer-overflow/?utm_source=feedly
Thegeekstuff
Buffer Overflow Attack Explained with a C Program Example
Buffer overflow attacks have been there for a long time. It still exists today partly because of programmers carelessness while writing a code. The reason I said ‘partly’ because sometimes a well written code can be exploited with buffer overflow attacks…
In web development, a #polyfill is code that implements a feature on web browsers that do not support the feature. Most often, it refers to a JavaScript library that implements an HTML5 web standard, either an established standard (supported by some browsers) on older browsers, or a proposed standard (not supported by any browsers) on existing browsers. Formally, "a polyfill is a shim for a browser API"
https://en.wikipedia.org/wiki/Polyfill_(programming)
https://en.wikipedia.org/wiki/Polyfill_(programming)
Wikipedia
Polyfill (programming)
code that implements a feature on web browsers that do not support the feature
The Page #Visibility API is useful for the Web application to know whether it is currently displayed on the front or not, especially to stop resource-intensive UI animations or data refreshing when it is not needed. On the mobile devices, the primary reason for that is to reduce the battery usage.
https://whatwebcando.today/foreground-detection.html
https://whatwebcando.today/foreground-detection.html
WhatWebCanDo
What Web Can Do Today: Foreground Detection
Can I rely on the Web Platform features to build my app? An overview of the device integration HTML5 APIs.
ابزاری مناسب در زمان توسعه کامپونتهای
https://storybook.js.org/
https://storybook.js.org/docs/guides/guide-react/
https://storybook.js.org/
https://storybook.js.org/docs/guides/guide-react/
Storybook
Storybook: Frontend workshop for UI development
Storybook is a frontend workshop for building UI components and pages in isolation. Thousands of teams use it for UI development, testing, and documentation. It's open source and free.