Next: Buffer Overruns
Up: Secure Programming
Previous: Setuid Programs
- Although this lecture will point out a few common security holes, a great many have already been discovered, and many more are out there waiting to be found.
Subsections
Cem Ozdogan
2007-05-07