Introduction


Buffer overflow vulnerability dot the information technology landscape more frequently than other vulnerabilities because it has little to do with security innately, the vulnerability arises due to human error that is difficult to detect and often not expected in the first instance.

Let us take an ordinary example that most of us are familiar with. There may have been times when you have desired to communicate something important to a coworker and upon meeting him/her have forgotten what it was that you had intended to communicate. Typically this happens when the interaction does not unfold as you have evinced it to, due to an out of the turn happening. This can be getting involved in a different conversation, a distracting event or even pre- occupation .

What has happened here is similar to buffer overflow. You wanted to communicate a message and the result of this communication would have been the basis of your future actions. However, a disruption in the intended communication, leads you to forgo the actions that you would have taken originally, and in turn results makes you act in ways you did not intend to originally.




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net