Exercises, examples and other material relating to training module P775. This module is presented on
Private Courses and
Specially Run Courses only
Background
This module pulls together many of the security aspects of Perl -
taking our generalised module that looks at programming issues relating
to secure coding in general and interpretting them for how the particular
general issues apply in Perl. Further material on your course will look
at relevant specific matters under individually titled sections.
Background information
Some modules are
available for download as a sample of our material or under an
Open Training Notes License for free download from
[here].
Topics covered in this module
Overview of security and Perl
Tainting.
Real, effective ID and suidperl.
Cleaning up your path.
Backtics, evals, execs and subshells.
Command line switches.
Unicode.
Public, protected, private - not in Perl; OO Perl security issues.
Regular expressions.
Magic in opens, globs, and other wild cards.
Temporary files, lock files and file locking.
Database transactions.
Networking matters, process forking and threads.
Sorts that give varying results.
Resource hogs and efficiency matters.
Complete learning
If you are looking for a complete course and not just a information on a single subject, visit our
Listing and schedule page.
Well House Consultants specialise in training courses in
Ruby,
Lua,
Python,
Perl,
PHP, and
MySQL. We run
Private Courses throughout the UK (and beyond for longer courses), and
Public Courses at our training centre in Melksham, Wiltshire, England.
It's surprisingly cost effective to come on our public courses -
even if
you live in a different
country or continent to us.
We have a technical library of over 700 books on the subjects on which we teach.
These books are available for reference at our training centre.