Explore >> Select a destination


You are here

stephank.nl
| | zwischenzugs.com
10.6 parsecs away

Travel
| | InAnatomy of a Linux DNS Lookup - Part I,Part II, andPart IIII covered: nsswitch /etc/hosts /etc/resolv.conf pingvshoststyle lookups systemdand itsnetworkingservice ifupandifdown dhclient resolvconf NetworkManager dnsmasq In Part IV I'll cover how containers do DNS. Yes, that's not simple either... Other posts in the series: Anatomy of a Linux DNS Lookup - Part I Anatomy of...
| | jvns.ca
12.3 parsecs away

Travel
| | IP addresses & routing
| | blog.jdboyd.net
10.2 parsecs away

Travel
| |
| | michaelneuper.com
92.4 parsecs away

Travel
| A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.