First page Back Continue Last page Graphics
What's on the Plan
General background on the security arena.
Introduce coding practices that often lead to vulnerabilities.
- More details on Buffer Overruns.
- Format strings will be discussed another time.
- Step by step demonstration of exploit code – next time.
Show how these vulnerabilities are exploited.