Search results

  • *[[Exploit (computer security)]] *[[Exploits River]], the longest river on the island of Newfoundland
    775 bytes (94 words) - 17:45, 3 May 2025
  • {{Short description|Process of increasing the security of a system}} In [[computer security]], '''hardening''' is usually the process of securing a system by reducing
    3 KB (339 words) - 06:55, 29 August 2024
  • ...arget Identification]], an AMD technology for mitigating computer security exploits; * [[Branch Target Injection]] or Spectre variant 2, a security vulnerability
    1 KB (137 words) - 19:49, 27 September 2023
  • |title=A Practical Introduction to Enterprise Network and Security Management |title=CSE 380 Computer Operating Systems
    3 KB (389 words) - 06:20, 20 October 2024
  • ...to trick the target into providing the answer to its own challenge.<ref>''Computer Networks'' by [[Andrew S. Tanenbaum]], 4th edition, {{ISBN|0-13-038488-7}}, ...<ref>[[Ross J. Anderson]]: <cite>[http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering: A Guide to Building Dependable Distributed Systems]</cite>, 1s
    3 KB (420 words) - 08:16, 8 September 2024
  • ...n Linux systems. The first result of the project was a [[computer security|security]] patch for the [[Linux (kernel)|Linux kernel]] that emulates an [[NX bit]] ...non-writeable. This suppresses many [[Exploit (computer science)|security exploits]], such as those stemming from [[buffer overflow]]s and other techniques re
    5 KB (795 words) - 22:09, 11 January 2025
  • {{Short description|Computer hacker}} ...ber/articles/04hacker.html Hacker Group Says Program Can Exploit Microsoft Security Hole]," ''[[New York Times]]'' 4 August 1998. Retrieved 24 April 2007.</ref
    6 KB (818 words) - 01:29, 30 March 2025
  • ...cation to overwrite internal structures such as [[linked list]] [[Pointer (computer programming)|pointers]]. The canonical heap overflow technique overwrites d ...buffer that is assumed to be freed will be expected to hold two [[Pointer (computer programming)|pointers]] FD and BK in the first 8 bytes of the formerly allo
    6 KB (821 words) - 21:24, 1 May 2025
  • {{Short description|Method of attack on computer systems}} ...applications]], [[Computer network|networks]], [[operating systems]], or [[Computer hardware|hardware]], typically for malicious purposes.
    18 KB (2,480 words) - 11:04, 25 May 2025
  • ...Vista]] and newer Microsoft Operating Systems are immune to both of these exploits. ...rce code being widely used and distributed, Microsoft was forced to create security patches, which were released a few weeks later. For a time, numerous flavo
    5 KB (691 words) - 11:24, 19 March 2025
  • '''Memory corruption''' occurs in a [[computer program]] when the contents of a [[Memory address|memory location]] are mod ...[C++]] have powerful features of explicit memory management and [[Pointer (computer programming)|pointer arithmetic]]. These features are designed for developi
    4 KB (564 words) - 16:46, 22 July 2023
  • {{Computer hacking}} ....<ref>{{Cite thesis |last=Arifgoğlu |first=Saliha Figen |title=Information security, privacy issues and an application |date=1988 |publisher=Middle East Techni
    6 KB (782 words) - 04:29, 29 May 2025
  • ...s as another [[User (computing)|user]], and on another computer across a [[computer network]]. ...l-known ports|well-known]] [[Transmission Control Protocol]] (TCP) [[Port (computer networking)|port number]] 513.
    6 KB (773 words) - 11:39, 8 April 2025
  • {{Short description|Computer security attack}} A '''"return-to-libc" attack''' is a [[computer security]] attack usually starting with a [[buffer overflow]] in which a subroutine
    5 KB (714 words) - 01:42, 8 November 2024
  • {{short description|Computer optimization technique}} ...is an [[optimization (computer science)|optimization]] technique where a [[computer system]] performs some task that may not be needed. Work is done before it
    8 KB (1,098 words) - 11:44, 25 May 2025
  • ...exploit]]s.<ref name="CWE134"/> Originally thought harmless, format string exploits can be used to [[Crash (computing)|crash]] a program or to execute harmful ...exploits for other software using this method began to surface. The first exploits that brought the issue to common awareness (by providing remote root access
    12 KB (1,754 words) - 06:22, 30 April 2025
  • ...unctuation)|space]]). When electromechanical [[teleprinter]]s were used as computer output devices, one or more null characters were sent at the end of each pr ...ing contexts that uses a null character to indicate the end of a [[string (computer science)|string]].<ref>"A ''string'' is a contiguous sequence of characters
    7 KB (1,119 words) - 11:27, 29 May 2025
  • {{Short description|Computer security attack via dial-up modems}} ...ry-point into computer or other electronic systems. It may also be used by security personnel, for example, to detect unauthorized devices, such as modems or f
    6 KB (964 words) - 09:33, 27 March 2025
  • {{Short description|Family of botnet computer worms}} '''Agobot''', also frequently known as '''Gaobot''', is a family of [[computer worm]]s. Axel "Ago" Gembe, a German programmer also known for leaking [[Hal
    6 KB (839 words) - 17:00, 29 December 2024
  • | industry = [[Network security]], [[security appliance]]s, [[Internet security]], [[WAN optimization]] ...rewall]]; [[VPN]]; [[wireless security]]; [[SD-WAN]]; zero-trust security; security appliance filtering [[e-mail spam|spam]], [[spyware]], [[viruses]] and othe
    13 KB (1,601 words) - 08:05, 13 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)