From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: * X-Spam-Status: No, score=1.3 required=5.0 tests=BAYES_00,INVALID_MSGID, MSGID_RANDY autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,905ac138a78d73df X-Google-Attributes: gid103376,public From: Ted Dennison Subject: Re: Study says "Buffer overflow" is most common security bug Date: 1999/11/24 Message-ID: <81gt4l$r4s$1@nnrp1.deja.com>#1/1 X-Deja-AN: 552463044 References: <383B79A5.66EC4FA4@mindspring.com> X-Http-Proxy: 1.0 x34.deja.com:80 (Squid/1.1.22) for client 204.48.27.130 Organization: Deja.com - Before you buy. X-Article-Creation-Date: Wed Nov 24 14:36:05 1999 GMT X-MyDeja-Info: XMYDJUIDtedennison Newsgroups: comp.lang.ada X-Http-User-Agent: Mozilla/4.6 [en] (WinNT; I) Date: 1999-11-24T00:00:00+00:00 List-Id: In article <383B79A5.66EC4FA4@mindspring.com>, Gemini-X2 wrote: > Thought this might interest some people here. There is an article on > news.com titled. "Study says "buffer overflow" is most common security > bug". If you want to read about this issue from the cracker side, check out http://www.cultdeadcow.com/cDc_files/cDc-351/ . If you can, that is. My company installed a net-nanny that prevents me from looking there now. -- T.E.D. Sent via Deja.com http://www.deja.com/ Before you buy.