Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
116 Chapter 3 • Understanding the Risks Associated with Mobile Code
Diamond Computer Systems of Australia (Figure 3.11).This small file
will scan any drive, directory, or file for any files it thinks might be
BO2K servers. It uses a pretty loose footprint to detect it, which means
it will be more likely to detect variations of BO2K, but there is also the
possibility of detecting a false signature.
The BO2K Server Sniper will begin scanning your computer and
bring up a list of possible BO2K servers, no matter what name they were
changed to. It also detects plug-in files as well, but usually these are
included within the server executable file, so it’s a little ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312