The countermeasures to a buffer overflow are as follows:

* Perform manual auditing of the code.
* Stack execution should be disabled.
* Take the support of the functions which are not the cause of the buffer overflow.
*
* Take compiler support. For example, Java automatically checks if an array index is within the proper bounds. Use compilers such as Java instead of C to avoid buffer overflow attacks. Use tools such as StackGuard and Immunix System to avoid buffer overflows.

Explore More

Nessus Vulnerability Scanner

Are you Vulnerable? If you don’t have the luxury of building secure software from the start and your business uses off the shelf software to get your work done you

Email Servers and Ports

Email Servers and PortsThere are two servers required for sending and receiving email, i.e. the SMTP and POP servers. ## Incoming and Outgoing Mail Servers # Incoming Mail Server# :

Keeping your wireless network secure

Here are a few steps to keep your AP secure.Remember nothing is unbreakable 1) Secure your wireless router or access point administration interface Almost all routers and access points have