Features

Features

  • Buffer Overruns: The sin explained

    What is a buffer overrun? This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, defines this "sin" and examines why it is so often exploited.  Continue Reading

  • Buffer Overruns: Affected languages

    C is the most common language used to create buffer overruns, closely followed by C++. In this excerpt, the authors of The 19 Deadly Sins of Software Security give advice on how to write cleaner code.  Continue Reading

  • Buffer Overruns: Example sins

    Buffer overruns are among the most widespread and serious vulnerabilities. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, details a few examples of buffer overruns from the Common Vulnerabilities and Exposures (CVE) ...  Continue Reading

  • Buffer Overruns: Spotting the sin

    Spotting buffer overruns during code review ranges from being very easy to extremely difficult. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security offers testing techniques for uncovering these code exploits.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close