Search results
Create the page "Computer security exploits" on this wiki! See also the search results found.
- *[[Exploit (computer security)]] *[[Exploits River]], the longest river on the island of Newfoundland775 bytes (94 words) - 17:45, 3 May 2025
- {{Short description|Process of increasing the security of a system}} In [[computer security]], '''hardening''' is usually the process of securing a system by reducing3 KB (339 words) - 06:55, 29 August 2024
- ...arget Identification]], an AMD technology for mitigating computer security exploits; * [[Branch Target Injection]] or Spectre variant 2, a security vulnerability1 KB (137 words) - 19:49, 27 September 2023
- |title=A Practical Introduction to Enterprise Network and Security Management |title=CSE 380 Computer Operating Systems3 KB (389 words) - 06:20, 20 October 2024
- ...to trick the target into providing the answer to its own challenge.<ref>''Computer Networks'' by [[Andrew S. Tanenbaum]], 4th edition, {{ISBN|0-13-038488-7}}, ...<ref>[[Ross J. Anderson]]: <cite>[http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering: A Guide to Building Dependable Distributed Systems]</cite>, 1s3 KB (420 words) - 08:16, 8 September 2024
- ...n Linux systems. The first result of the project was a [[computer security|security]] patch for the [[Linux (kernel)|Linux kernel]] that emulates an [[NX bit]] ...non-writeable. This suppresses many [[Exploit (computer science)|security exploits]], such as those stemming from [[buffer overflow]]s and other techniques re5 KB (795 words) - 22:09, 11 January 2025
- {{Short description|Computer hacker}} ...ber/articles/04hacker.html Hacker Group Says Program Can Exploit Microsoft Security Hole]," ''[[New York Times]]'' 4 August 1998. Retrieved 24 April 2007.</ref6 KB (818 words) - 01:29, 30 March 2025
- ...cation to overwrite internal structures such as [[linked list]] [[Pointer (computer programming)|pointers]]. The canonical heap overflow technique overwrites d ...buffer that is assumed to be freed will be expected to hold two [[Pointer (computer programming)|pointers]] FD and BK in the first 8 bytes of the formerly allo6 KB (821 words) - 21:24, 1 May 2025
- {{Short description|Method of attack on computer systems}} ...applications]], [[Computer network|networks]], [[operating systems]], or [[Computer hardware|hardware]], typically for malicious purposes.18 KB (2,480 words) - 11:04, 25 May 2025
- ...Vista]] and newer Microsoft Operating Systems are immune to both of these exploits. ...rce code being widely used and distributed, Microsoft was forced to create security patches, which were released a few weeks later. For a time, numerous flavo5 KB (691 words) - 11:24, 19 March 2025
- '''Memory corruption''' occurs in a [[computer program]] when the contents of a [[Memory address|memory location]] are mod ...[C++]] have powerful features of explicit memory management and [[Pointer (computer programming)|pointer arithmetic]]. These features are designed for developi4 KB (564 words) - 16:46, 22 July 2023
- {{Computer hacking}} ....<ref>{{Cite thesis |last=Arifgoğlu |first=Saliha Figen |title=Information security, privacy issues and an application |date=1988 |publisher=Middle East Techni6 KB (782 words) - 04:29, 29 May 2025
- ...s as another [[User (computing)|user]], and on another computer across a [[computer network]]. ...l-known ports|well-known]] [[Transmission Control Protocol]] (TCP) [[Port (computer networking)|port number]] 513.6 KB (773 words) - 11:39, 8 April 2025
- {{Short description|Computer security attack}} A '''"return-to-libc" attack''' is a [[computer security]] attack usually starting with a [[buffer overflow]] in which a subroutine5 KB (714 words) - 01:42, 8 November 2024
- {{short description|Computer optimization technique}} ...is an [[optimization (computer science)|optimization]] technique where a [[computer system]] performs some task that may not be needed. Work is done before it8 KB (1,098 words) - 11:44, 25 May 2025
- ...exploit]]s.<ref name="CWE134"/> Originally thought harmless, format string exploits can be used to [[Crash (computing)|crash]] a program or to execute harmful ...exploits for other software using this method began to surface. The first exploits that brought the issue to common awareness (by providing remote root access12 KB (1,754 words) - 06:22, 30 April 2025
- ...unctuation)|space]]). When electromechanical [[teleprinter]]s were used as computer output devices, one or more null characters were sent at the end of each pr ...ing contexts that uses a null character to indicate the end of a [[string (computer science)|string]].<ref>"A ''string'' is a contiguous sequence of characters7 KB (1,119 words) - 11:27, 29 May 2025
- {{Short description|Computer security attack via dial-up modems}} ...ry-point into computer or other electronic systems. It may also be used by security personnel, for example, to detect unauthorized devices, such as modems or f6 KB (964 words) - 09:33, 27 March 2025
- {{Short description|Family of botnet computer worms}} '''Agobot''', also frequently known as '''Gaobot''', is a family of [[computer worm]]s. Axel "Ago" Gembe, a German programmer also known for leaking [[Hal6 KB (839 words) - 17:00, 29 December 2024
- | industry = [[Network security]], [[security appliance]]s, [[Internet security]], [[WAN optimization]] ...rewall]]; [[VPN]]; [[wireless security]]; [[SD-WAN]]; zero-trust security; security appliance filtering [[e-mail spam|spam]], [[spyware]], [[viruses]] and othe13 KB (1,601 words) - 08:05, 13 May 2025