C++ Language/Std/Strings/AvoidingBufferOverrun
Appearance
Some of the original C-Runtime functions were succeptible to a buffer-overrun-hack.
For example, strnlen(NULL, 16)
would cause a runtime-error.
A safer alternative is available in Win32; strnlen_s(NULL, 16)
simply returns 0
without trying to overrun the buffer.