Next: Buffer Overruns
Up: Secure Programming
Previous: Setuid Programs
Contents
- Although this lecture will point out a few common security holes, a great many have already been discovered, and many more are out there waiting to be found.
Subsections
Cem Ozdogan
2007-05-16