When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. JSFuck - Wikipedia

    en.wikipedia.org/wiki/JSFuck

    JSFuck can be used to bypass detection of malicious code submitted on websites, e.g. in cross-site scripting (XSS) attacks. [10] Another potential use of JSFuck lies in code obfuscation. An optimized version of JSFuck has been used to encode jQuery, a JavaScript library, into a fully functional version written with just the six characters. [11]

  3. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    In software development, obfuscation is the practice of creating source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code to conceal its purpose ...

  4. Jscrambler - Wikipedia

    en.wikipedia.org/wiki/Jscrambler

    Jscrambler is a technology company mainly known for its JavaScript obfuscator and eponymous monitoring framework. The obfuscator makes it harder to reverse engineer a web application's client-side code and tamper with its integrity.

  5. Data masking - Wikipedia

    en.wikipedia.org/wiki/Data_masking

    Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.

  6. Code injection - Wikipedia

    en.wikipedia.org/wiki/Code_injection

    Here, the code under attack is the code that is trying to check the parameter, the very code that might have been trying to validate the parameter to defend against an attack. [20] Any function that can be used to compose and run a shell command is a potential vehicle for launching a shell injection attack.

  7. SQL injection - Wikipedia

    en.wikipedia.org/wiki/SQL_injection

    A classification of SQL injection attacking vector as of 2010. In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

  8. Indistinguishability obfuscation - Wikipedia

    en.wikipedia.org/wiki/Indistinguishability...

    In 2001, Barak et al., showing that black-box obfuscation is impossible, also proposed the idea of an indistinguishability obfuscator, and constructed an inefficient one. [8] [7] [2] Although this notion seemed relatively weak, Goldwasser and Rothblum (2007) showed that an efficient indistinguishability obfuscator would be a best-possible obfuscator, and any best-possible obfuscator would be ...

  9. Talk:Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Talk:Obfuscation_(software)

    While source code minification (the removal of comments, whitespace, and sometimes line breaks, and perhaps switching to shorter, less descriptive variable names) could be considered to obfuscate the code somewhat, this is often done simply to reduce bandwidth use and accelerate parsing (e.g. in Javascripts for web) without intent to obfuscate.