Buffer Overruns


Advertisement

COMODO Memory Firewall  v.2.0.4.20

Free Comodo Memory Firewall is a buffer overflow detection and prevention tool which provides the ultimate defense against one of the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects ...

RS-232  v.2.0



An added bonus is the Data wedge that sends all incoming serial data to your windows keyboard buffer.Your serial data can be sent to any windows based program.

This Serial RS-232 utility has become very useful to engineers.





Advertisement

FXHelloCube  v.2.0

The implementation of a single and double buffer version of the 3D canvas is described within the source code. As soon as Java 3D has rendered all attached and active views for a single frame JavaFX will repaint all corresponding SwingComponents in a ...

Erics TelNet98 10.2-SSH  v.1.0

Features of Erics TelNet98 do include: Windows Sockets based ANSI and SCO-ANSI compatible Terminal emulation, a large substantial scroll back buffer, auto session connect, auto login, built-in file transfer, lineprinter emulation, named sessions, session ...

ProjectTrack 2007 - Personal Edition  v.2007.3

Not knowing which 33% is why a plan is often late and cost overruns are common. All plans requires action items, risks, issues, changes, milestones, resources, meetings, and mounds of documents. Attempting to manage these with an MS Project-like tool ...

Project Track 2007 - Collaborative (muti-user) Edi  v.2007.3

Not knowing which 33% is why a plan is often late and cost overruns are common. All plans requires action items, risks, issues, changes, milestones, resources, meetings, and mounds of documents. Attempting to manage these with an MS Project-like tool ...

Bill Redirect Serial COMPort to Keyboard V1.2M  v.1.0

The program will redirect serial and or TCP inputs from COM ports to keyboard buffer on your computer, as if the data were directly typed in from the keyboard. Features include: Debugger, run in System Tray, Configuration protected by PASSWORD, Macro ...

Buffz RPG  v.1 6



Wootun's King requests your help ! A new source of evil magic is corrupting the planet, and only an overpowered buffer can stop this !
Choose from EIGHT buffers, with unique initial stats and get ready for some fighting !

Use your ...

Flash mp3 player  v.4.0.0

The player can automatically buffer mp3 files for smooth and frustration free playback.

DragonWAF IIS7 Demo Version  v.3.1.2.5

Buffer Overflow
7. LDAP Injection
8. Phishing
9. HTTP Response Splitting
10. Content Spoofing
11. Predictable Resource Location
12. Denial of Service
13. Application Fingerprinting
14. Insufficient Session Expiration
15.

PASSPORT Host Integration Objects 2009-731  v.1.0

Offers a path to host information at the screen buffer level, allowing you to read and write data to the host, open and close sessions, send function keys to the host and much more. Includes the object components, documentation, test programs and source ...

OSsurance Desktop Kernel Firewall  v.4.0

This software blocks the execution of spyware, viruses, worms, Trojans, attacks via improperly configured firewalls, Buffer Overflow Attacks (BoF), attacks via unpatched program vulnerabilities, and unauthorized software installation.

Project Track  v.2007.3.9

Not knowing which 33% is why a plan is often late and cost overruns are common. All plans requires action items, risks, issues, changes, milestones, resources, meetings, and mounds of documents. Attempting to manage these with an MS Project-like tool ...

CopyBadFile  v.1.0

CopyBadFile is one small tool for copying files (bad) using changeable size of read buffer and retry count. The CopyBadFile (Copy bad files) lets you to copy files (bad) using changeable size of read buffer and retry count. There is also a possibility ...

Binary Compression 79  v.5.4.3

Binary Compression is a binary compression based on 2-byte data word right (low) bit truncation dependent on max of dictionary (re) occurences for each data buffer . Thus such (truncated) dictionary entries represent most of input data buffer . Dictionary ...

Pages : < 1 | 2
Newest Reviews