Buffer Overflow, virus&worms and service attack tools
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#1
04-10-2010, 11:21 AM



.ppt   Buffer Overflow.ppt (Size: 389 KB / Downloads: 41)

Buffer Overflow , Virus & Worms and The “stacheldraht” service attack tool

abstract
over flow

A process in memory:
- text (Program code; marked
read-only, so any attempts to
write to it will result in
segmentation fault)
- data segment (Global and
static variables)
- stack (Dynamic variables)

The process is blocked and is rescheduled to run again with a larger memory space if the user attack exhausts available memory.

worm and virus

parasitic programs which are designed to alter the way a computer operates without the permission or knowledge of the user.
-must meet two criteria:
-must execute itself. it will often place its own code in the
path of execution of another program.
- must replicate itself.
- require infected host file, but worms don't.
- they incorporate themselves within executable program files.
- some infects in files such as MS-Word and MS-Excel (because we could put strings of program commands (called "macros") in the data files)
- some attach themselves to boot records.
- they infects in files until the layload
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,368 26-08-2015, 12:37 AM
Last Post: Leenas
  wireless video service in cdma systems wikipedia jaseelati 0 371 13-01-2015, 04:29 PM
Last Post: jaseelati
  Calling a Web Service from an ASP.NET Web Page ppt study tips 1 526 19-10-2014, 11:24 PM
Last Post: LICjKYTCf
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 17 11,659 21-03-2014, 05:30 AM
Last Post: MichaelKa
  Filter a curve with one of the mirror filter tools in HyperGraph, HyperView seminar projects maker 0 343 21-09-2013, 04:56 PM
Last Post: seminar projects maker
  computer virus and anti virus full report computer science technology 14 19,592 20-09-2013, 02:27 PM
Last Post: chantiammu
  Research Tools in Data Mining ppt seminar projects maker 0 412 19-09-2013, 04:47 PM
Last Post: seminar projects maker
  SERVICE ORIENTED ARCHITECUTRE PPT seminar projects maker 0 278 12-09-2013, 03:38 PM
Last Post: seminar projects maker
  Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS) seminar projects maker 0 461 11-09-2013, 03:40 PM
Last Post: seminar projects maker
  SIMULATION OF BLACK HOLE ATTACK IN WIRELESS AD-HOC NETWORKS pdf study tips 0 240 07-09-2013, 02:20 PM
Last Post: study tips