Chapter 3. Secure Programming

Contributed by Murray Stokely.
Table of Contents
3.1. Synopsis
3.2. Secure Design Methodology
3.3. Buffer Overflows
3.4. SetUID issues
3.5. Limiting your program's environment
3.6. Trust
3.7. Race Conditions

3.1. Synopsis

This chapter describes some of the security issues that have plagued UNIX® programmers for decades and some of the new tools available to help programmers avoid writing exploitable code.

All FreeBSD documents are available for download at

Questions that are not answered by the documentation may be sent to <>.
Send questions about this document to <>.