Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 01/10/2007 10:52:02 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies ]


To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
Technical
2 posted on 01/10/2007 10:52:37 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Buffer overflows have been prevented on many Unix systems by things like address space randomization, randomizing where libraries are loaded, etc. Windows is a) insecure by design, b) insecure by architecture (the GUI graphics drivers run INSIDE the kernel), c) insecure by implementation .


5 posted on 01/10/2007 11:37:20 AM PST by ikka
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

I'm just curious who writes apps that crash on buffer overflows. I'm retired from programming, but I would never have released a program that couldn't handle arbitrary input. Most of the stuff I wrote edited input at the keystroke level.


6 posted on 01/10/2007 11:45:24 AM PST by js1138 (The absolute seriousness of someone who is terminally deluded.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson