dcsimg

More articles by Ibrahim Haddad

Preventing Buffer Overflow Exploits, Part 2

The buffer overflow exploit has become almost ubiquitous in recent years. This article looks at how DSM guards against such exploits when implemented as a Linux module.