Features

Features

  • Buffer Overruns: Extra defensive measures

    Stack protection and non-executable stack and heap are techniques which add an extra layer of defense, however they are not fail proof. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security reviews these defensive measures ...  Continue Reading

  • Buffer Overruns: Other resources

    This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, shares resources on buffer overruns and a list of guidelines for securing code.  Continue Reading

  • Buffer Overruns: Redemption steps

    There is a variety of techniques to help you avoid buffer overruns, and a number of other techniques to reduce the damage it can cause. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security takes a look at how you can improve...  Continue Reading

  • Hacking other machines

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Elevating privileges

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Initial compromise

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • How to get an attacker out of your network

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Target network

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Network footprinting

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Taking over the domain

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close