The countermeasures to a buffer overflow are as follows:

* Perform manual auditing of the code.
* Stack execution should be disabled.
* Take the support of the functions which are not the cause of the buffer overflow.
*
* Take compiler support. For example, Java automatically checks if an array index is within the proper bounds. Use compilers such as Java instead of C to avoid buffer overflow attacks. Use tools such as StackGuard and Immunix System to avoid buffer overflows.

Explore More

Physical Access is total Access

Hacking Your Computer – Physical Access is Total Access Table of Contents -Disclaimer -Introduction Part 1: Gaining Access -LiveCDs -Windows Option 1: Cracking the Password -Windows Option 2: Circumventing the

IP spoofing

IP spoofing is about the most advanced attack that can be executed on a computer system. IP spoofing, if done correctly, is one of the smoothest and hardest attacks on

Infection via HTML

Edit the code on what and how you need it, and yes this is detectable  in many cases, but you could insert a small FUD downloader to be  downloaded via