但是,如果经营体制,标志着互联网通信缓冲区的记忆,因为只有被有效遏制数据,而不是代码,黑客的攻击将不会得开始。
But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.
本文针对缓冲区溢出攻击提出了一种有效的抵御方法。
This paper presents an efficient approach to buffer overflow attacks.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attack technology is a very efficient attack technology based on network.
最后讨论如何根据溢出规律和植入代码的结构特征,采取有效措施来防御缓冲区溢出攻击。
At last discuss how to defense buffer overflow by the rule of buffer overflow and the structure character of injected code.
并从整个企业实际出发,给出了有效防御缓冲区溢出攻击的策略。
From the reality of the whole enterprise, an effective defensive strategy is presented.
有效地利用这种危险,一个攻击者必须满足的缓冲区字节0x2000直到3字节正在左前最后头是复制到0x2000字节缓冲区。
To reliably exploit this vulnerability, an attacker has to fill the 0x2000 bytes buffer until 3 bytes are left before the last header is copied into the 0x2000 bytes buffer.
有效地利用这种危险,一个攻击者必须满足的缓冲区字节0x2000直到3字节正在左前最后头是复制到0x2000字节缓冲区。
To reliably exploit this vulnerability, an attacker has to fill the 0x2000 bytes buffer until 3 bytes are left before the last header is copied into the 0x2000 bytes buffer.
应用推荐