Sponsored Content
Full Discussion: Hacking buddy
The Lounge What is on Your Mind? Hacking buddy Post 302981956 by Corona688 on Wednesday 21st of September 2016 04:37:25 PM
Old 09-21-2016
Quote:
Originally Posted by gandolf989
Whatever you do, don't dream to be a pro C programmer. IMHO, I think it is just around for backwards compatibility.
C is certainly not always the right tool for the job, but C is the language which creates the right tool for the job.

C is the language to write languages and libraries in. AWK, Perl, Python, PHP, Apache, most SQL implementations, tar, zip, gzip, bzip, lzop, Windows, X11, BASH, KSH, CSH, ZSH, Linux, OSX, Java, Firefox, and beyond -- all C or C++. Libraries and extensions and drivers for all of the above -- generally C/C++ too.

This is because C is fairly unique: A high/low level language so low-level it almost describes basic CPU operations, and compiles to CPU bytecode, and depends on nothing. Lots of languages have one or two of these properties, almost none have all four. C libraries can export to nearly any language, which makes them a good common denominator as well.

In short, C is a living, current language, used for almost everything you do with your computer, and not obsolete by any means. It probably won't be for quite a long time yet.
This User Gave Thanks to Corona688 For This Post:
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Hacking

I asked my firend about hacking so he told me to come here. I want to know how to get Volumes I, II and III. Does anyone know how to help me and help me become a good hacker? This is what i came here to do!!!!!! (2 Replies)
Discussion started by: nfsu2
2 Replies

2. Linux

Hacking

Im wondering how i can chat to some one (1 Reply)
Discussion started by: Neas
1 Replies

3. Cybersecurity

hacking

I want to start with hacking and learning it from the scratch! I have googled and found thousands of pages but I would like to know how to start really! It's always good to hear from security experts. please give me some links. the ones which are related to unix hacking. (1 Reply)
Discussion started by: messi777
1 Replies
RATS(1) 						      General Commands Manual							   RATS(1)

NAME
rats - Rough Auditing Tool for Security SYNOPSIS
rats [options] [file]... DESCRIPTION
rats is a rough auditing tool for security developed by Secure Software, Inc. It is a tool for scanning C, Perl, PHP, and Python source code and flagging common security related programming errors such as buffer overflows and TOCTOU (Time Of Check, Time Of Use) race condi- tions. As its name implies, the tool performs only a rough analysis of source code. It will not find every error and will also find things that are not errors. Manual inspection of your code is still necessary, but greatly aided with this tool. When started, RATS will scan each file or each file in the directory specified on the command line and produce a report when scanning is complete. What vulnerabilities are reported in the final report depend on the data contained in the vulnerability database or databases that are used and the warning level in use. For each vulnerability, the list of files and line numbers where it occured is given, followed by a brief description of the vulnerability and suggested action. OPTIONS
-h, --help Displays a brief usage summary and exit. -a <fun> Report any occurence of function 'fun' in the source file(s) -d <filename>, --database <filename>, --db <filename> Specifies a vulnerability database to be loaded. You may have multiple -d options and each database specified will be loaded. -i, --input Causes a list of function calls that were used which accept external input to be produced at the end of the vulnerability report. -l <lang>, --language <language> Force the specified language to be used regardless of filename extension. Currently valid language names are "c", "perl", "php" and "python". -r, --references Causes references to vulnerable function calls that are not being used as calls themselves to be reported. -w <level>, --warning <level> Sets the warning level. Valid levels are 1, 2 or 3. 1 includes only default and high severity. 2 includes medium severity (default). 3 includes low severity vulnerabilities. -x Causes the default vulnerability databases (which are in the installation data directory, /usr/share/rats by default) to not be loaded. -R, --no-recurssion Do not recurse subdirectories when encountered. --xml Output in XML --html Output in HTML --follow-symlinks Follow symlinks and treat them like whatever they are pointing to. If the symlink points to a directory it will be descended into unless -R is specified, if a pointing to a file, it will be treated as a file. AUTHOR
This manual page was orginally written by Adam Lazur <adam@lazur.org>, for the Debian GNU/Linux system (but may be used by others). Modified by Secure Software, Inc. September 17, 2001 RATS(1)
All times are GMT -4. The time now is 02:16 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy