Features

Features

Enterprise software

  • Buffer Overruns: Extra defensive measures

    Stack protection and non-executable stack and heap are techniques which add an extra layer of defense, however they are not fail proof. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security reviews these defensive measures ...  Continue Reading

  • Buffer Overruns: Example sins

    Buffer overruns are among the most widespread and serious vulnerabilities. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, details a few examples of buffer overruns from the Common Vulnerabilities and Exposures (CVE) ...  Continue Reading

  • Buffer Overruns: Spotting the sin

    Spotting buffer overruns during code review ranges from being very easy to extremely difficult. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security offers testing techniques for uncovering these code exploits.  Continue Reading

  • Buffer Overruns: Overview of the sin

    Buffer overruns have long been recognized as a significant application security problem. Here is a brief overview of this "deadly sin" of software security.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

Close