abuse

What is the worst abuse you've seen of LINQ syntax?

On a recent Dot Net Rocks podcast, Jon Skeet mentioned possible abuses of LINQ syntax. What examples have people seen where crazy things are being done with LINQ? ...

How do you prevent/handle abuse of your software?

I'm developing a small freeware application which can display text in a special structure. (bible texts, to be specific) Lately I discovered that some users use my application to view texts protected by copyright and some are even providing downloads of such texts. (EDIT: Mostly bible translations which are sold by their copyright hol...

Improper Use of Version Control

I have started working recently in driver verification for a hardware company. The work is writing short software tests that verify known issues, bugs and possible faults anyone can think of. Now, in the course of my basic training for the role here I have come across an ugly practice of version control usage. The company uses SVN for h...

How would I protect an API from abuse?

Hey everyone, I run an image hosting website and I'm designing an API for it. My concern is that I don't want anyone to be able to do something like: while(true) { Upload(); } and spam/DoS the site. My current solution is to limit all IP addresses to a certain amount of uploads per day/hour. I believe this will work fine for des...

Why doesn't function name concatenation work in PHP?

<?php $a = 'ec'; $b = 'ho'; $c = $a.$b; echo('Huh?'); $c('Hello, PHP!'); ?> yields Huh? Fatal error: Call to undefined function echo() in <...>/php.php on line 11 Why? ...

Detecting login credentials abuse.

Greetings. I am the webmaster for a small, growing industrial association. Soon, I will have to implement a restricted, members-only section for the website. The problem is that our organization membership both includes big companies as well as amateur “clubs” (it's a relatively new industry…). It is clear that those clubs will share ...

Best practice to avoid "add friend" abuse

I have a PHP / CodeIgniter site with basic social functionality which obviously includes an "Add friend" link. When clicking this link an AJAX call is made in the background, which adds the user associated with the link as a friend of the logged in user. Also the link transforms into "Remove friend" which does what it says on the tin, ju...

Is it possible to have a tableless select with multiple rows?

A SELECT without a FROM clause gets us a multiple columns without querying a table: SELECT 17+23, REPLACE('bannanna', 'nn', 'n'), RAND(), CURRENT_TIMESTAMP; How can we write a query that results in multiple rows without referring to a table? Basically, abuse SELECT to turn it into a data definition statement. The result could have a ...

Detecting abuse for post rating system

I am using a wordpress plugin called "GD Star Rating" to allow my users to vote on stories that I post to one of my websites. http://everydayfiction.com/ Recently we have been having a lot of abuse of the system. Stories that have obviously been voted up artificially. "GD Star Rating" creates some detailed logs when a user votes on a sto...

Old-school Pascal question about how to cast variant record function parameters properly

I am trying to create a function with a variant record-type parameter that allows inline-casting or assignment, as such: type rectype = ( VT_INT, VT_CHAR, VT_BOOL ); rec = record case t : rectype of VT_INT : ( i : integer ); VT_CHAR : ( c : char ); VT_BOOL : ( b : boolean ); end; procedure h...

How can the leecher do this?

The original website: http://www.vnedoc.com The leecher's website: http://www.vipa1.com As you can see they are completely the same except for the author (sangsang -> trangxinh) and the logo (v.v.v). How could the leacher do this? How can I prevent this? ...