作者: Péter Ször , Eric Chien
DOI:
关键词: Focus (computing) 、 Computer security 、 Engineering 、 Buffer overflow 、 Exploit 、 Hacker 、 Computer virus 、 End user
摘要: Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers virus writers for a long time. However, until recently, these were not common place in computer viruses. The CodeRed worm was major shock to the antivirus industry since it first that spread as file, but solely memory utilizing buffer overflow Microsoft IIS. Many companies unable provide protection against CodeRed, while other with wider focus on security able solutions relief of end users.