From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_00,LOTS_OF_MONEY, TO_NO_BRKTS_FROM_MSSP autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 107f24,582dff0b3f065a52 X-Google-Attributes: gid107f24,public X-Google-Thread: 1014db,582dff0b3f065a52 X-Google-Attributes: gid1014db,public X-Google-Thread: 109fba,582dff0b3f065a52 X-Google-Attributes: gid109fba,public X-Google-Thread: 103376,bc1361a952ec75ca X-Google-Attributes: gid103376,public X-Google-ArrivalTime: 2001-08-01 11:44:01 PST Path: archiver1.google.com!newsfeed.google.com!newsfeed.stanford.edu!feed.textport.net!newsranger.com!www.newsranger.com!not-for-mail Newsgroups: comp.lang.ada,comp.lang.c,comp.lang.c++,comp.lang.functional From: Ted Dennison References: <3B6555ED.9B0B0420@sneakemail.com> <87n15lxzzv.fsf@deneb.enyo.de> <3B672322.B5EA1B66@home.com> <5ee5b646.0108010949.5abab7fe@posting.google.com> <%CX97.14134$ar1.47393@www.newsranger.com> Subject: Re: How Ada could have prevented the Red Code distributed denial of service attack. Message-ID: X-Abuse-Info: When contacting newsranger.com regarding abuse please X-Abuse-Info: forward the entire news article including headers or X-Abuse-Info: else we will not be able to process your request X-Complaints-To: abuse@newsranger.com NNTP-Posting-Date: Wed, 01 Aug 2001 14:43:55 EDT Organization: http://www.newsranger.com Date: Wed, 01 Aug 2001 18:43:55 GMT Xref: archiver1.google.com comp.lang.ada:10972 comp.lang.c:71343 comp.lang.c++:79129 comp.lang.functional:7094 Date: 2001-08-01T18:43:55+00:00 List-Id: In article <%CX97.14134$ar1.47393@www.newsranger.com>, Ted Dennison says... > >>"Mike Smith" wrote in message news:... >>> The buffer overflow occurs because of a bug in the *Microsoft* C library. >>> This is not endemic to C or C++ in general. And, what, no one has ever >If you don't think this is a big problem, check out this cracker website, which >is dedicated to teaching young script kiddies how to exploit Windows Buffer >Overflows: http://www.cultdeadcow.com/cDc_files/cDc-351/ >My own company blocks it, but I understand it is titled: "The Tao of Windows >Buffer Overflow". :-) I found a mirror which folks like me behind facist firewalls may have an easier time accessing. http://www.supportamerica.com/win_buff/win_buff_overflow.html . If you don't understand the buffer overflow problem (which apparently, at least Mike doesn't), its a highly reccomended read. They even come out and say that there are languages that don't have this problem, but Microsoft was too lazy to use one of them (a rough paraphrase of their words). --- T.E.D. homepage - http://www.telepath.com/dennison/Ted/TED.html home email - mailto:dennison@telepath.com