Overflow

Results: 1424



#Item
161Eddy / Physical oceanography / Fluid dynamics / Atmospheric dynamics / Barotropic

A Process Study of the Denmark Strait Overflow J B Girton (Department of Physical Oceanography, Woods Hole Oceanographic Institution, Woods Hole, MA 02536; ph; fax; e-mail ); T B

Add to Reading List

Source URL: www.agu.org

Language: English - Date: 2015-04-16 11:32:18
162Software bugs / Subroutines / C Standard Library / Return-to-libc attack / Control flow / Stack buffer overflow / Buffer overflow / Address space layout randomization / JMP / Computing / Software engineering / Computer programming

Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
163Internet / DNS rebinding / Cross-site request forgery / HTTP cookie / Firewall / Stack buffer overflow / Denial-of-service attack / Firefox / Malware / Computing / Computer network security / Software

CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-05-18 15:16:38
164Software bugs / Shellcode / Len Sassaman / Buffer overflow / USENIX / ;login: / Address space layout randomization / RSA / David Brumley / Cryptography / Cyberwarfare / Computer security

The Danger of Unrandomized Code EDWAR D J . SCHWART Z Of Headless User Accounts and Restricted Shells JAN SCHAUMANN

Add to Reading List

Source URL: www.usenix.org

Language: English
165Software bugs / C Standard Library / Computer errors / OpenBSD / Memory management / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C dynamic memory allocation / Computing / Computer programming / Software engineering

CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
166Software bugs / C POSIX library / Computer errors / Stack buffer overflow / Buffer overflow / Write / Stack / Uncontrolled format string / Sizeof / Computing / Software engineering / Computer programming

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-12-11 05:02:06
167California / Hyatt / Emeryville / San Francisco 4th and King Street Station / Powell Street Station / California Street / San Francisco / Bay Street Emeryville / Emeryville Shellmound / Geography of California / Emeryville /  California / San Francisco Bay Area

Recommended Overflow Hotels: Hotel Vitale – 1 block 8 Mission Street San Francisco, CA3700 www.hotelvitale.com

Add to Reading List

Source URL: www.cafda.org

Language: English - Date: 2015-05-04 13:21:11
168Environmental engineering / Civil engineering / Hydrology / Sewerage / Subterranea / Discharge / Storm drain / Pumping station / Wastewater / Water / Water pollution / Physical geography

NOVATO SANITARY DISTRICT OVERFLOW REPORTING For: April 2015 COLLECTION SYSTEM OVERFLOWS FOR APRIL 2015 The Novato Sanitary District Collection System had no (zero) sewer system

Add to Reading List

Source URL: www.novatosan.com

Language: English - Date: 2015-05-14 20:21:10
169Architecture / Civil engineering / Plumbing / Environmental engineering / Pumps / Sump pump / Drain / Basement / Septic tank / Sewerage / Construction / Home appliances

WATER BACKUP & SUMP OVERFLOW Each year, sewer and drain backups can cause millions of dollars in damages. Waste water from the home normally comes from bathrooms, kitchens & laundry rooms. Waster water travels through t

Add to Reading List

Source URL: www.mainemutual.com

Language: English - Date: 2011-03-15 14:23:46
170Computer programming / Dangling pointer / Pointer / Stack buffer overflow / Debugging / Memory leak / Lock / Buffer overflow / C dynamic memory allocation / Computing / Software bugs / Software engineering

ConMem: Detecting Severe Concurrency Bugs through an Effect-Oriented Approach Wei Zhang Chong Sun

Add to Reading List

Source URL: people.cs.uchicago.edu

Language: English - Date: 2010-01-19 14:05:40
UPDATE