The world is growing rapidly with
various technologies, and accordingly the illegal activities are being
increased by adopting these new technologies. Every country has their own laws
and regulations. In the UK people are convicted under the Computer Misuse Act
1990 for illegal activities, which are done with the help of technologies, and
there are evidences proved that many people have been sentenced under those
laws (Turner, M., 2013).Apart from that, there are few regulations such as
RIPA 2000, which gives power to certain authorities in the UK to carry out
surveillance or intercepting the communications against a person for a specific
reason. The question is that how these laws are being used effectively and reasonably?
Gaining information illegally or by misusing the power of rights is against the
law and publishing this information is unethical and against Media Regulations.
Everything about threat intelligence, blue team, red team, pentesting, security audit, security review, testing and assessment.
Saturday, April 5, 2014
Friday, April 4, 2014
Practical Buffer Overflow - Vulnerability Disclosure
Attackers generally use buffer overflows to corrupt the execution stack of a web application. By sending
carefully crafted input to a web application, an attacker can cause the
web application to execute arbitrary code, possibly taking over the
machine. Attackers have managed to identify buffer overflows in a
staggering array of products and components. Buffer overflow flaws can be present in both the web server and
application server products that serve the static and dynamic portions
of a site, or in the web application itself. Buffer overflows found in
commonly-used server products are likely to become widely known and can
pose a significant risk to users of these products. When web
applications use libraries, such as a graphics library to generate
images or a communications library to send e-mail, they open themselves
to potential buffer overflow attacks.
Subscribe to:
Posts (Atom)