Background: If you call the value of a segment of memory,
I'm thinking C/C++ here, then the value returned is the
value that already exitst in that memory space. For example:
if 12345 existed at a specific segment of memory that was
then assigned to $var, the value of $var would be 12345.
Unless you predeclare that $var is to be a specific value
That is a well known security problem, I believe that is
how stack exploites work.
Abigail says that the variable is assigned an empty list
either way you choose to assign it (my $var or my $var = ()).
If that is true then there should be no security differences
between either way. Sound correct?
In reply to Re: Predeclaration
by cybear
in thread Predeclaration
by hakkr
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |