More articles by Ibrahim Haddad

Preventing Buffer Overflow Exploits, Part 2

The buffer overflow exploit has become almost ubiquitous in recent years. This article looks at how DSM guards against such exploits when implemented as a Linux module.

Thanks for your registration, follow us on our social networks to keep up-to-date