Tutorial: Preventing Buffer Overflow Exploits Using the Linux Distributed Security Module, Part 1
Internet servers (such as Web, email, and ftp servers) have been the target for different kinds of attacks aiming to disable them from providing services to their respective users. One particular exploit, which has become almost ubiquitous in the last several years, is the buffer overflow exploit. In Part 1 of this article, we describe the buffer overflow exploit and provide detailed examples to help understand it.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.