Promoting Open Source, Always…
February 24, 2009 § Leave a comment
A coder called Tav submitted this challenge. Enjoy!
His module was created with the intent to restrict execution to local filesystem.
Tagged: python, security
Fill in your details below or click an icon to log in:
You are commenting using your WordPress.com account. ( Log Out / Change )
You are commenting using your Twitter account. ( Log Out / Change )
You are commenting using your Facebook account. ( Log Out / Change )
You are commenting using your Google+ account. ( Log Out / Change )
Connecting to %s
Notify me of new comments via email.
« Why DOS Path Seperator is backslash
Humor: Unusual Passenger on PDX MAX »
You are currently reading Challenge to Break Python Security at RAPD.
Create a free website or blog at WordPress.com.