Explore >> Select a destination


You are here

x0rb3l.github.io
| | syprog.blogspot.com
12.5 parsecs away

Travel
| | Source code for this article may be found here . The problem of software security has already been raised in my previous articles more ...
| | michaelneuper.com
11.3 parsecs away

Travel
| | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.
| | www.welivesecurity.com
10.8 parsecs away

Travel
| | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful.
| | www.stevenhicks.me
49.4 parsecs away

Travel
| Did you know your blog's syntax highlighter probably has support for highlighting code diffs? I didn't.