Buffer Overflow explained, well worth the long read
Buffer Overflow explained, well worth the long read
Finally been able to read this long article and it is well worth reading. Reminds me of the days when I was trying to understand all the esp, eip, eas (which I have to say I have more or less forgotten haha) but this goes through the consequences of what can happen if you don't check and double check for unexpected cases. Cheers +Ars Technica
Just goes to show, it is damn hard to make things secure nowadays and we need help and tool to help us do it.
http://arstechnica.com/security/2015/08/how-security-flaws-work-the-buffer-overflow/
from Google+ https://plus.google.com/+RichardTan/posts/2qHHUXqfFgX via IFTTT
Finally been able to read this long article and it is well worth reading. Reminds me of the days when I was trying to understand all the esp, eip, eas (which I have to say I have more or less forgotten haha) but this goes through the consequences of what can happen if you don't check and double check for unexpected cases. Cheers +Ars Technica
Just goes to show, it is damn hard to make things secure nowadays and we need help and tool to help us do it.
http://arstechnica.com/security/2015/08/how-security-flaws-work-the-buffer-overflow/
How security flaws work: The buffer overflow Starting with the 1988 Morris Worm, this flaw has bitten everyone from Linux to Windows. |