Talk:Exploit (computer security): Difference between revisions

Content deleted Content added
Critique of current article, and suggestions on how it could be improved by someone with the neccessary security knowlage.
No edit summary
Line 22:
 
I really think that this article could be brought up to the level of one of wikipedia's computer science articles, include broad examples, and include a holistic aproach to viewing exploits as a subset of bug finding.
 
Lastly, return to libc is not an attack, it is a technique used when control of a return address on the stack has been obtained. Please correct me if I am wrong about this.
 
-- Unfortunetly not anonymous user, November 7, 2006