DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


Buffer Overflow | The Basics

Buffer Overflow | The Basics



Hi, welcome back to Devils Blog On Security, in this post we'll discus some basics about buffer overflows also known as buffer overruns. So before we discus what is buffer overflow or buffer overrun is we will have a look on what exactly is buffer. Computer stores information in form of bits, for example if you want to store number 3 in computer's memory it will be stored in its binary form which is 11, as you can see 11 will require 2 bits to get stored in memory that indirectly means the number 3 will require 2 bits of computer memory or 2 bits of buffer. In simple words buffer is amount of memory allocated for particular variable or element.

To All Visitors Of Devils Blog Please Read This

To All Visitors Of Devils Blog Please Read This



After long time I yesterday I posted a new article on Devils Blog. It has been nearly one year this blog is live and since the time it is live I got several suggestions and recommendations by people on how to improve its over all quality. Following are some complaints and suggestions that I received from the time this blog is live,

Must Read Before You Buy Spyware

Must Read Before You Buy Spyware


Hello visitor, if you are here then surely you are planning to buy spyware and you stopped by just to to know what I want to tell you before you buy one. First of all if you are too lazy to read this article completely because it is little lengthy or you don't want to waste your half second rolling your finger on your mouse and scroll down then please close this window and leave immediately because reading this article incomplete would be good enough to not reading it.

There are different reasons for which different people buy spywares. Following are some of them,

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security