The countermeasures to a buffer overflow are as follows:

* Perform manual auditing of the code.
* Stack execution should be disabled.
* Take the support of the functions which are not the cause of the buffer overflow.
*
* Take compiler support. For example, Java automatically checks if an array index is within the proper bounds. Use compilers such as Java instead of C to avoid buffer overflow attacks. Use tools such as StackGuard and Immunix System to avoid buffer overflows.

Explore More

Non-persistent XSS vulnerabilities Sam’s Whois

Sam’s Whois is a free php class with supporting scripts which make adding a domain name whois lookup to your website incredibly simple. Main Features * All major tlds supported

WikiLeaks supporters step up cyber war

LONDON (AFP)— A group of hackers vowed on Thursday to intensify a “war of data” against Mastercard, Visa and other groups which have cut funding to the WikiLeaks website over

SQL Injection Cheat Sheet

(wiki) SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either