CHCon 2023

Roger Dunham

"I'm truly ancient (compared to most hackers) which means that I've had time to work in a range of industries. While there I have picked up a thing or two about many subjects.
I've worked as a researcher, web designer, coder, tester, documenter and customer advocate.
For a number of years I worked in the field of PDF reconstruction, but I've also worked in Māori language development, job-management for plumbers and the logging of oil wells.
But prior to that, in the 20th Century I wrote Javascript backed websites about forest research. And some of those are still online.
I also drink beer, play music and dance."


Session

11-25
16:15
15min
Use of GFlags for identifying Access Violations
Roger Dunham

Memory leaks and Access Violations are intrinsically bad code, with the potential for being exploited by bad-actors. In some languages, for example C++, they are easy to create. The talk demonstrates one tool, GFlags, that can be used to help to identify the presence of such bad code, and to provide confidence that once fixed, they stay fixed.

Main Track
Ngaio Marsh Theatre