Video: Uli Drepper on buffer overflow
Find out how stack buffer overflows work, the vulnerabilities abused by such attacks, and a security implementation that can stop the attack before it even begins.
At Red Hat Magazine.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.