Content deleted Content added
Critique of current article, and suggestions on how it could be improved by someone with the neccessary security knowlage. |
No edit summary |
||
Line 22:
I really think that this article could be brought up to the level of one of wikipedia's computer science articles, include broad examples, and include a holistic aproach to viewing exploits as a subset of bug finding.
Lastly, return to libc is not an attack, it is a technique used when control of a return address on the stack has been obtained. Please correct me if I am wrong about this.
-- Unfortunetly not anonymous user, November 7, 2006
|