{"guid":"import-91e5b00343840237ef","title":"Grundlagen der sicheren Programmierung","subtitle":"Typische Sicherheitslücken","slug":"24c3-2344-de-grundlagen_der_sicheren_programmierung","link":"http://events.ccc.de/congress/2007/Fahrplan/events/2344.en.html","description":"Dieser Vortrag bietet eine Übersicht über einige Dinge, welche man im Kopf behalten sollte, wenn man Software schreibt - vorausgesetzt, diese soll nachher nur von der Person benutzt werden, die sie auch betreibt. Die theoretischen Aspekte der Sicherheit werden mit Codebeispielen untermalt.\n","original_language":"eng","persons":["Tonnerre Lombard"],"tags":["24c3"," Hacking"],"view_count":249,"promoted":false,"date":"2007-12-29T01:00:00.000+01:00","release_date":"2008-01-12T01:00:00.000+01:00","updated_at":"2026-01-28T22:45:12.325+01:00","length":3578,"duration":3578,"thumb_url":"https://static.media.ccc.de/media/congress/2007/24c3-2344-de-grundlagen_der_sicheren_programmierung_high.jpg","poster_url":"https://static.media.ccc.de/media/congress/2007/24c3-2344-de-grundlagen_der_sicheren_programmierung_high_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2007/import-91e5b00343840237ef-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2007/import-91e5b00343840237ef-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/24c3-2344-de-grundlagen_der_sicheren_programmierung","url":"https://api.media.ccc.de/public/events/import-91e5b00343840237ef","conference_title":"24C3: Volldampf voraus!","conference_url":"https://api.media.ccc.de/public/conferences/24c3","related":[{"event_id":1037,"event_guid":"import-d36e7bab6f1646de7f","weight":2},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":2},{"event_id":1112,"event_guid":"import-49fe42523b9cb3d932","weight":2},{"event_id":1127,"event_guid":"import-b6012b5b50d2444d03","weight":2},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":2},{"event_id":1179,"event_guid":"import-b30e3e74eed3d62975","weight":4},{"event_id":1184,"event_guid":"import-c6c52b89d377695a6a","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":6},{"event_id":1189,"event_guid":"import-67fcc17551c8eeefd2","weight":3},{"event_id":1219,"event_guid":"import-c1b343dc3dc4828a06","weight":3},{"event_id":1224,"event_guid":"import-8b83be574c5fcc8ac9","weight":3},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":8},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":2},{"event_id":1242,"event_guid":"import-d175259861c6ba7d80","weight":3},{"event_id":1248,"event_guid":"import-efface9996f81eb8ed","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":2},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":3},{"event_id":2886,"event_guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","weight":2},{"event_id":2923,"event_guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","weight":2},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":2},{"event_id":5734,"event_guid":"adde2800-ffa1-44c4-aafd-c4928ee5378d","weight":2}],"recordings":[{"size":134,"length":3578,"mime_type":"video/webm","language":"eng","filename":"24c3-2344-de-grundlagen_der_sicheren_programmierung.webm","state":"downloaded","folder":"webm","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:29.778+01:00","recording_url":"https://cdn.media.ccc.de/congress/2007/webm/24c3-2344-de-grundlagen_der_sicheren_programmierung.webm","url":"https://api.media.ccc.de/public/recordings/2142","event_url":"https://api.media.ccc.de/public/events/import-91e5b00343840237ef","conference_url":"https://api.media.ccc.de/public/conferences/24c3"},{"size":null,"length":3578,"mime_type":"video/mp4","language":"eng","filename":"24c3-2344-de-grundlagen_der_sicheren_programmierung_high.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:29.746+01:00","recording_url":"https://cdn.media.ccc.de/congress/2007/mp4/24c3-2344-de-grundlagen_der_sicheren_programmierung_high.mp4","url":"https://api.media.ccc.de/public/recordings/4170","event_url":"https://api.media.ccc.de/public/events/import-91e5b00343840237ef","conference_url":"https://api.media.ccc.de/public/conferences/24c3"}]}