Welcome! Log In Create A New Profile

Advanced

Task 6A-1

Posted by stephen1 
Announcements Last Post
Announcement SoC Curricula 09/30/2017 01:08PM
Announcement Demarcation or scoping of examinations and assessment 02/13/2017 07:59AM
Announcement School of Computing Short Learning Programmes 11/24/2014 08:37AM
Announcement Unisa contact information 07/28/2011 01:28PM
Task 6A-1
July 08, 2008 10:07PM
2.

(a)

Buffer overflow exploits. Format-String exploits

(b)

These exploits cannot really be prevented. But by having a much deeper knowledge of file permissions, variables, memory allocation, functions and assembly language, the hackers exploits can quickly be identified and rectified.

(c)

It's positive and negative. Positive in the sense that the particular exploit is known and so an appropriate anti-virus software can be developed. Negative in the sense that it provides a training enviroment for the wood-be-hacker.

(d)

Network administrators should leave security to companies that specialise in the complex field of security.
Sorry, only registered users may post in this forum.

Click here to login