Computer

Template Processor

This article talks about Template Processor, which is also known as a template engine or template parser. It is typically include features common to most high-level programming languages, with an emphasis on features for processing plain text. It is used in various contexts for different purposes.....

Read More »

Self Modifying Code

This article talks about Self Modifying Code, which is a piece of software which achieves its goal by rewriting itself as it goes along. It is executing – usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simp.....

Read More »

Port Scanner

Port Scanner is the name for the technique used to identify open ports and services available on a network host. It is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of […]<.....

Read More »

Ping of Death

This article describe about Ping of Death, which is a type of network attack in which an attacker sends a network packet that is larger than what the target computer can handle. It is a method of using the ping command to freeze or reboot the computer by sending a packet greater than 65536 bytes......

Read More »

End-of-File

End-of-File is a code placed by a computer after a file’s last byte of data. It is either determined when the reader returns null as seen in Java’s BufferedReader, or sometimes people will manually insert an EOF character of their choosing to signal when the file has ended. EOF marks .....

Read More »

Buffer Overflow

Buffer Overflow is probably the best known form of software security vulnerability. It occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. It can be triggered by inputs that are designed to execute code, or alter the wa.....

Read More »

Static Program Analysis

This article talks about Static Program Analysis, which is the art of reasoning about the behavior of computer programs without actually running them. In most cases the analysis is performed on some version of the source code, and in the other cases, some form of the object code. In contrast, it .....

Read More »

Cohesion in Computer Programming

Cohesion in Computer Programming refers to the level of strength and unity with which different components of a software program are inter-related with each other. Cohesion measures the strength of relationship between pieces of functionality within a given module. Cohesion of any software determ.....

Read More »

Modular Programming

Modular Programming is a subset of procedural programming that enforces a logical structure on the program being written to make it more efficient and easier to understand and modify. It can often be used in a variety of applications and functions with other components of the system. It is closel.....

Read More »

Runtime Verification

Runtime Verification is an emerging research field with strong ties to Model Checking. It is a computing system analysis and execution approach based on extracting information from a running system and using it to detect and possibly react to observed behaviors satisfying or violating certain pro.....

Read More »

Intelligent Verification

This article talks about Intelligent Verification, whih is is a software process that allows engineers and technicians to use computers to ensure that a hardware design will perform as expected once the device has been fabricated or built. It uses information derived from the design and specifica.....

Read More »

Denotational Semantics

Denotational Semantics is a methodology for giving mathematical meaning to programming languages and systems. It is an approach of formalizing the meanings of programming languages by constructing mathematical objects that describe the meanings of expressions from the languages. It was developed .....

Read More »