Buffer Overflow, virus&worms and service attack tools
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
04-10-2010, 11:21 AM

.ppt   Buffer Overflow.ppt (Size: 389 KB / Downloads: 40)

Buffer Overflow , Virus & Worms and The “stacheldraht” service attack tool

over flow

A process in memory:
- text (Program code; marked
read-only, so any attempts to
write to it will result in
segmentation fault)
- data segment (Global and
static variables)
- stack (Dynamic variables)

The process is blocked and is rescheduled to run again with a larger memory space if the user attack exhausts available memory.

worm and virus

parasitic programs which are designed to alter the way a computer operates without the permission or knowledge of the user.
-must meet two criteria:
-must execute itself. it will often place its own code in the
path of execution of another program.
- must replicate itself.
- require infected host file, but worms don't.
- they incorporate themselves within executable program files.
- some infects in files such as MS-Word and MS-Excel (because we could put strings of program commands (called "macros") in the data files)
- some attach themselves to boot records.
- they infects in files until the layload

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: seminar topics for cse buffer overflow attack, buffer overflow attack tools, buffer overflow attack tool,
Popular Searches: buffer overflow by example, worms detection code in java, seminar only electronics buffer overflow attack, overflow scroll, signature free buffer overflow attack blocker in telugu meaning, buffer agent, summery on remote frame buffer protocol,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,350 26-08-2015, 12:37 AM
Last Post: Leenas
  wireless video service in cdma systems wikipedia jaseelati 0 359 13-01-2015, 04:29 PM
Last Post: jaseelati
  Calling a Web Service from an ASP.NET Web Page ppt study tips 1 514 19-10-2014, 11:24 PM
Last Post: LICjKYTCf
  General Packet Radio Service (Download Full Seminar Report) Computer Science Clay 17 11,624 21-03-2014, 05:30 AM
Last Post: MichaelKa
  Filter a curve with one of the mirror filter tools in HyperGraph, HyperView seminar projects maker 0 339 21-09-2013, 04:56 PM
Last Post: seminar projects maker
  computer virus and anti virus full report computer science technology 14 19,510 20-09-2013, 02:27 PM
Last Post: chantiammu
  Research Tools in Data Mining ppt seminar projects maker 0 407 19-09-2013, 04:47 PM
Last Post: seminar projects maker
  SERVICE ORIENTED ARCHITECUTRE PPT seminar projects maker 0 273 12-09-2013, 03:38 PM
Last Post: seminar projects maker
  Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS) seminar projects maker 0 457 11-09-2013, 03:40 PM
Last Post: seminar projects maker
Last Post: study tips