IN THIS CHAPTER
Understanding the Motivation
Is Software Security a Feature? Is Security Vulnerability a Bug?
Understanding the Buffer Overrun
Using Safe String Functions
It seems as though a day doesn't go by without a news story about yet another computer security issue. Hackers, viruses, worms, spyware, backdoors, Trojan horses, and denial-of-service attacks have become common terms. Even average computer users have been impacted beyond the nuisance level, losing important data and valuable time restoring their systems after an attack. A January 14, 2005, story in the LA Times by Joseph Menn, titled, “No More Internet for Them,” reveals that many people ...