equal
deleted
inserted
replaced
6 |
6 |
7 \section*{Handout 3 (Buffer Overflow Attacks)} |
7 \section*{Handout 3 (Buffer Overflow Attacks)} |
8 |
8 |
9 By far the most popular attack method on computers are buffer |
9 By far the most popular attack method on computers are buffer |
10 overflow attacks or simple variations thereof. The popularity is |
10 overflow attacks or simple variations thereof. The popularity is |
11 unfortunate because we now have technology to prevent them |
11 unfortunate because we nowadays have technology in place to prevent them |
12 effectively. But these kind of attacks are still very relevant |
12 effectively. But these kind of attacks are still very relevant |
13 even today since there are many legacy systems out there and |
13 even today since there are many legacy systems out there and |
14 also many modern embedded systems do not take any precautions |
14 also many modern embedded systems do not take any precautions |
15 to prevent such attacks. |
15 to prevent such attacks. |
16 |
16 |