I have recently read the news about Google Chrome Buffer Overflow vulnerability (see this link). Admittedly, I was ignorant enough not to understand how a buffer overflow can cause severe security breaches! Wikipedia came to the rescue, as well as some research into the topic of Assembly-language programming. At last I can understand how SEVERE such an attack could be!
You can dig for it too ;-)
check the Wikipedia article,
http://en.wikipedia.org/wiki/Buffer_overflow
and the excellent book of Programming from the Ground Up, for much better understanding of Assembly:
http://savannah.nongnu.org/projects/pgubook/
Enjoy!
Popular Posts
-
Biomedical Engineering make extensive use of software. Signal processing algorithms and other aspects of the biomedical engineering needs ex...
-
I was very disappointed by the poor sound capabilities of the GNU Ocatve project compared to MATLAB. The playaudio() function was inconveni...
-
Bugzilla is a great project. Yet, customizing it to your needs is an overwhelming task! I was assigned a task that our Bugzilla server shoul...
-
Please contribute to this new emerging WikiBook Biomedical Engineering: A Roadmap Don't forget to add your name to the authors list ;-)
-
At last, lecture notes on Biomedical Engineering =) http://www.morganclaypool.com/toc/bme/3/1
Saturday, September 27, 2008
Wednesday, September 3, 2008
Subscribe to:
Posts (Atom)