Specifies that an exception appropriate to the condition , such as out of memory , buffer overflow , and so forth , be thrown 指定引發(fā)相應(yīng)于該條件的異常,如內(nèi)存不足、緩沖區(qū)溢出等。
Windows xp security patch : multiple unc provider buffer overflow vulnerability windows xp security patch : smtp rollup Windows xp修補程序:基于direct3d的屏幕保護程序休眠/待機錯誤
The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years 這里最大的問題是幼稚的用戶不一定知道如何選取更好的口令。
When it finds a vulnerable system , this malware sends a specially crafted packet to produce a buffer overflow on lsass . exe 為了大量散播病毒檔案,病毒掃描網(wǎng)路以便搜尋未修正的系統(tǒng)
As a consequence , in this column , we ll introduce the single biggest software security threat : the dreaded buffer overflow 在這部分中,我們將開始討論口令系統(tǒng)的實質(zhì)- -驗證用戶身份。
Buffer overflow occurs when a program or process tries to store more data in a buffer than it was intended to hold 緩沖區(qū)溢出發(fā)生在一個程序或進程試圖在一個緩沖區(qū)中存儲多于其存儲量的數(shù)據(jù)時。
Learn how to write secure applications , validate and check inputs , prevent buffer overflows , and more with david wheeler s 中學(xué)習(xí)如何編寫安全的應(yīng)用程序,驗證和檢查輸入,防止緩沖區(qū)溢出,等等。
Buffer overflow attack is the main measure of hacker ’ s attack . it has done more and more harm to information security 緩沖區(qū)溢出攻擊是黑客攻擊的主要手段,給網(wǎng)絡(luò)信息安全帶來了越來越大的危害。
Unnecessary services can be used by an outside attacker to execute code on the server , such as by using buffer overflows see 外部攻擊者可以利用不必要的服務(wù)在服務(wù)器上執(zhí)行代碼,比如通過緩存溢出(參見
" the most frequent attack path hackers use to get into systems is to use stack overflows , buffer overflows , and memory overflows “黑客用來闖入系統(tǒng)最常見的攻擊方法是使用堆棧溢出、緩沖區(qū)溢出和內(nèi)存溢出。