0 0 16

Secure coding technique: The Custom Permission Problem

When developing for mobile, applications often have to request some permissions from the system. They might need access to the user's...

Read More…

0 0 32

Are your developers the first line of risk or defense? Rate your company against our Secure Coding Checklist

If we look at any organization, public or commercial, there are two things we can guarantee. Firstly, their products and services are...

Read More…
unknownx500 {Flixelpix} David

1 0 41

Secure Code Warrior part of GCHQ Accelerator

Software has become even more ubiquitous in our daily lives, controlling the devices and applications that are the lifeblood of modern...

Read More…

0 0 13

Secure coding technique: Securely deleting files

Deleting files on a computer system is tricky. Everybody, even your mother, has deleted a file too many before and has been happy to find...

Read More…

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.