<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="http://racfor.zesoi.fer.hr/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>Računalna forenzika / Computer forensics racfor_wiki:javascript</title>
        <description></description>
        <link>http://racfor.zesoi.fer.hr/</link>
        <lastBuildDate>Wed, 29 Apr 2026 05:35:52 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>http://racfor.zesoi.fer.hr/lib/tpl/A_Centered_Perspective/images/favicon.ico</url>
            <title>Računalna forenzika / Computer forensics</title>
            <link>http://racfor.zesoi.fer.hr/</link>
        </image>
        <item>
            <title>racfor_wiki:javascript:potencijalne_prijetnje_ranjivosti_u_javascript_ekosustavu</title>
            <link>http://racfor.zesoi.fer.hr/doku.php?id=racfor_wiki:javascript:potencijalne_prijetnje_ranjivosti_u_javascript_ekosustavu&amp;rev=1733401457&amp;do=diff</link>
            <description>Potencijalne prijetnje/ranjivosti u Javascript ekosustavu

Sažetak

U Javascript-u postoji veliki broj potencijalnih napada, u seminaru je obrađena potencijalna prijetnja od “malicious lifecycle script” napada i vulnerabilnosti Dependency Confusion. Kako bih se obranili od navedenih napada potrebno je koristiti poznate pakete s provjerenim komentarima korisnika, dobro proučiti ovisnosti i koristiti</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>racfor_wiki:javascript</category>
            <pubDate>Thu, 05 Dec 2024 12:24:17 +0000</pubDate>
        </item>
    </channel>
</rss>
