Features

Features

  • Buffer Overruns: The sin explained

    What is a buffer overrun? This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, defines this "sin" and examines why it is so often exploited.  Continue Reading

  • Buffer Overruns: Extra defensive measures

    Stack protection and non-executable stack and heap are techniques which add an extra layer of defense, however they are not fail proof. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security reviews these defensive measures ...  Continue Reading

  • Buffer Overruns: Example sins

    Buffer overruns are among the most widespread and serious vulnerabilities. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, details a few examples of buffer overruns from the Common Vulnerabilities and Exposures (CVE) ...  Continue Reading

  • Buffer Overruns: Spotting the sin

    Spotting buffer overruns during code review ranges from being very easy to extremely difficult. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security offers testing techniques for uncovering these code exploits.  Continue Reading

  • Buffer Overruns: Affected languages

    C is the most common language used to create buffer overruns, closely followed by C++. In this excerpt, the authors of The 19 Deadly Sins of Software Security give advice on how to write cleaner code.  Continue Reading

  • Target network

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Taking over the domain

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • How to get an attacker out of your network

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Hacking other machines

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Elevating privileges

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close