The countermeasures to a buffer overflow are as follows:

* Perform manual auditing of the code.
* Stack execution should be disabled.
* Take the support of the functions which are not the cause of the buffer overflow.
*
* Take compiler support. For example, Java automatically checks if an array index is within the proper bounds. Use compilers such as Java instead of C to avoid buffer overflow attacks. Use tools such as StackGuard and Immunix System to avoid buffer overflows.

Explore More

What are the phases of malicious hacking?

The following are the phases of malicious hacking: Reconnaissance: In this phase, the attacker gathers information about the victim. Scanning: In this phase, the attacker begins to probe the target

XSS: Types and Uses

We all know that XSS is the most common exploit to be found in any website. However, different forms of XSS have different uses, as i will cover in this

Sony Rootkits your computer

SONY ROOTKITS SYSTEMS when you put a CD in to play it, a prospect that is both disturbing and scary at the same time. If you thought the record companies