Article JMGY LXer: How security flaws work: The buffer overflow

LXer: How security flaws work: The buffer overflow

by
LXer
from LinuxQuestions.org on (#JMGY)
Published at LXer:

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm-1988's Morris Worm-used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems...

Read More...latest?d=yIl2AUoC8zA latest?i=gyXpse86sUc:xbNHoSeapYk:F7zBnMy latest?i=gyXpse86sUc:xbNHoSeapYk:V_sGLiP latest?d=qj6IDK7rITs latest?i=gyXpse86sUc:xbNHoSeapYk:gIN9vFwgyXpse86sUc
External Content
Source RSS or Atom Feed
Feed Location https://feeds.feedburner.com/linuxquestions/latest
Feed Title LinuxQuestions.org
Feed Link https://www.linuxquestions.org/questions/
Reply 0 comments