The countermeasures to a buffer overflow are as follows:

* Perform manual auditing of the code.
* Stack execution should be disabled.
* Take the support of the functions which are not the cause of the buffer overflow.
*
* Take compiler support. For example, Java automatically checks if an array index is within the proper bounds. Use compilers such as Java instead of C to avoid buffer overflow attacks. Use tools such as StackGuard and Immunix System to avoid buffer overflows.

Explore More

Several avast sites were defaces

Last month, eight sites at once well-known anti-virus solutions avast!  Were defaces: http://www.avast.co.za/ (mirror; date: 2010-01-22 15:06:28) http://awast.org/ (mirror; date: 2010-02-18 18:57:27) http://www.avast.de/ (mirror; date: 2010-02-18 18:58:01) http://shop.avast.de/ (mirror; date:

Finding 0days in Web Applications

Most zero-day exploits in web applications are usually easier to find, study, and attack than actual services like a webserver due to the fact that a hacker does not need

Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/

PlanetCreator has reported another Critical XSS Vulnerability in Ministry of Transport http://www.mot.gov.mm/ Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious