28 Apr
2003
28 Apr
'03
01:48
On Sun, 27 Apr 2003, Anders Johansson wrote:
On Sunday 27 April 2003 20:10, Anders Johansson wrote:
#include
#include int main(int argc, char argv[]){ char buf[100]; ssize_t size;
size=read(0, buf, 100); if(size > 0){ buf[size]='\0';
printf("Received string: %s\n", buf); } exit(0); } <snip> #include
int main(int argc, char argv[]){ char buf[100]; size_t size;
size=fread(buf, 1, 100, stdin); if(size > 0){ buf[size]='\0';
printf("Received string: %s\n", buf); } exit(0); }
and yes, I'm aware of the bug in those programs :)
Enlight me, I only see one, no protection against buffer overflows..