Glossary
Technical terms explained
A...
to the topB...
to the topC...
to the topD...
to the topE...
to the topF...
to the topG...
to the topH...
to the topI...
to the topJ...
to the topK...
to the topL...
to the topM...
to the topN...
to the topO...
to the topP...
to the topQ...
to the topR...
to the topS...
to the topT...
Tainted mode
This mode tells Perl to internally mark any user input as untrustworthy. This
doesn't turn out to be a problem as long as this data is used purely internally
for calculations, etc., because they cannot be abused in any way.
Things look entirely differently when this data is supposed to be used for
potentially risky operations like opening a file. Perl, though, still won't
complain as long as the provided data is merely written to a file, but as soon
as this data is to be used to determine the location
at which to store a file, Perl is going to refuse to comply. In this case
danger is imminent that files get overwritten this way that normally should
have stayed untouched. In its normal mode of operation Perl would simply
execute the action. However, in Tainted mode Perl is going to abort with an
exception when it is told to perform any unsafe action with unverified user
input.
U...
to the topV...
to the topW...
to the topX...
to the topY...
to the topZ...
to the topHome