You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -246,29 +246,29 @@ Sooner or later I will complete it with the relative answers. Feel free to contr
246
246
247
247
248
248
### [[↑]](#toc) <aname='security'>Questions about Security:</a>
249
-
* How to write secure code? In your opinion, is it one of the developer's duties, or does it require a specialized role in the Company? And why?
249
+
* How do you write secure code? In your opinion, is it one of the developer's duties, or does it require a specialized role in the company? And why?
250
250
* Why is it said that cryptography is not something you should try to invent or design yourself?
251
-
* What's Two Factor Authentication? How would you implement it in an existing web application?
252
-
* If not carefully handled, logs always risk to contain sensible information, such as passwords. How would you deal with this?
251
+
* What is two factor authentication? How would you implement it in an existing web application?
252
+
* If not carefully handled, there is always a risk of logs containing sensitive information, such as passwords. How would you deal with this?
253
253
* Write down a snippet of code affected by SQL Injection and fix it.
254
254
* How would it be possible to detect SQL Injection via static code analysis? I don't expect you to write an algorithm capable of doing this, as it is probably a huge topic, but let's discuss a general approach.
255
255
* What do you know about Cross-Site Scripting? If you don't remember it, let's review online its definition and let's discuss about it.
256
256
* What do you know about Cross-Site Forgery Attack? If you don't remember it, let's review online its definition and let's discuss about it.
257
257
* How does HTTPS work?
258
-
* What's a Man-in-the-middle Attack? And why does HTTPS can help protecting against it?
259
-
* How can you prevent the user session to be stolen? Chances are you remember what Session or Cookie Hijacking is, otherwise let's read its Wikipedia page together.
258
+
* What's a Man-in-the-middle Attack, and why does HTTPS help protect against it?
259
+
* How can you prevent the user's session from being stolen? Chances are you remember what Session or Cookie Hijacking is, otherwise let's read its Wikipedia page together.
* Why Functional Programming matters? When should a functional programming language be used?
264
+
* Why does Functional Programming matter? When should a functional programming language be used?
265
265
* How do companies like Microsoft, Google, Opera and Mozilla profit from their browsers?
266
266
* Why does opening a TCP socket have a large overhead?
267
267
* What is Encapsulation important for?
268
268
* What is a real-time system and how is it different from an ordinary system?
269
269
* What's the relationship between real-time languages and heap memory allocation?
270
-
* Immutability is the practice of setting values once, at the moment of their creation, and never changing them. How immutability can help writing safer code?
271
-
*Pro and cons of mutable and immutable values.
270
+
* Immutability is the practice of setting values once, at the moment of their creation, and never changing them. How can immutability help write safer code?
271
+
*What are the pros and cons of mutable and immutable values.
272
272
* What's the Object-Relational impedance mismatch?
273
273
* Which principles would you apply to define the size of a cache?
0 commit comments