Features

Features

  • Buffer Overruns: Overview of the sin

    Buffer overruns have long been recognized as a significant application security problem. Here is a brief overview of this "deadly sin" of software security.  Continue Reading

  • Buffer Overruns: Affected languages

    C is the most common language used to create buffer overruns, closely followed by C++. In this excerpt, the authors of The 19 Deadly Sins of Software Security give advice on how to write cleaner code.  Continue Reading

  • Buffer Overruns: Extra defensive measures

    Stack protection and non-executable stack and heap are techniques which add an extra layer of defense, however they are not fail proof. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security reviews these defensive measures ...  Continue Reading

  • Buffer Overruns: Example sins

    Buffer overruns are among the most widespread and serious vulnerabilities. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, details a few examples of buffer overruns from the Common Vulnerabilities and Exposures (CVE) ...  Continue Reading

  • Buffer Overruns: Spotting the sin

    Spotting buffer overruns during code review ranges from being very easy to extremely difficult. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security offers testing techniques for uncovering these code exploits.  Continue Reading

  • Buffer Overruns: Other resources

    This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, shares resources on buffer overruns and a list of guidelines for securing code.  Continue Reading

  • Buffer Overruns: Redemption steps

    There is a variety of techniques to help you avoid buffer overruns, and a number of other techniques to reduce the damage it can cause. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security takes a look at how you can improve...  Continue Reading

  • Target network

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Initial compromise

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Hacking other machines

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Elevating privileges

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

Close