Stack buffer overflow

Sort By:
Page 5 of 6 - About 54 essays
  • Better Essays

    An Industrial training report On AUTOMATIC RAILWAY GATE CONTROL Submitted in partial fulfillment of the requirement of the degree of BACHELOR OF ENGINEERING In ELECTRONICS AND COMMUNICATION ENGINEERING By M.SHALINI ANIL NEERUKONDA INSTITUTE OF TECHNOLOGY AND SCIENCES Sangivalasa -531162, Bheemunipatnam (mandal) Visakhapatnam, Andhra Pradesh 2009-2013 ACKNOWLEDGEMENT Our sincere thanks and gratitude to Roshan sir for all the support and kindness he has bestowed upon us

    • 9546 Words
    • 39 Pages
    Better Essays
  • Decent Essays

    Networking MC

    • 3425 Words
    • 14 Pages

    zzz1. The Physical Layer of the OSI model is responsible for: a) establishing, maintaining and terminating connections across the intervening network b) reliable transfer of information across the physical link c) data units are delivered error free, in sequence, with no losses or duplications d) all of the above e) none of the above 2. An example of an application layer protocol is a) HTTP c) UDP e) None of the above b) HDLC d) TCP 3.Techniques for transmitting a digital signal over an

    • 3425 Words
    • 14 Pages
    Decent Essays
  • Better Essays

    Table of Contents 1.Introduction 2. Literature survey 3.Formation of the Problem 4.System specification 5.Design of solution 6.Implementation 7.Results and Discussions 8.System testing 9.Conclusion and future scope 10.References INTELLIGENT AMBULANCE FOR CITY TRAFFIC AND GSM TO SENT THE STATUS OF THE PATIENT TO THE HOSPITAL ABSTRACT: The main aim of this project is develop an intelligent ambulance which will reach the hospitals without any problem in heavy traffics. INTRODUCTION: This particular

    • 19743 Words
    • 79 Pages
    Better Essays
  • Better Essays

    1. Introduction Security is a standout amongst the most difficult and complex issue in Information Technology (IT) today. Security causes millions of dollars loss to the different organizations every year. Even if 99% of all assaults result from known vulnerabilities and flawed misconfigurations, an answer is most certainly not direct. With a crowd of networks, operating system and application related vulnerabilities, security specialists are getting the opportunity to be logically aware of the need

    • 3159 Words
    • 13 Pages
    Better Essays
  • Better Essays

    Net Sec Essay

    • 11858 Words
    • 48 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADEDSTARTS AS SERVICE Y/N 1. tftpd32 Starts as a service 2. FileZilla Server Interface- The interface does not start as a service and must be ran manually 3. Wireshark – Does not start as a service and must be ran manually 4. Nessus Server Manager – Does not start as a service and

    • 11858 Words
    • 48 Pages
    Better Essays
  • Decent Essays

    Triple DES Model

    • 8729 Words
    • 35 Pages

    Glossary 3DES (Triple DES): An enhancement to the original DES algorithm that uses multiple keys to encrypt plaintext. See also DES. AAA: Shorthand for the system controls authentication, authorization, and accountability. Abstraction: A process of viewing an application from its highest-level functions, which makes lower-level functions abstract. Access control: The ability to permit or deny the use of an object (a passive entity such as a system or file) by a subject (an active entity

    • 8729 Words
    • 35 Pages
    Decent Essays
  • Decent Essays

    Rfid Based Attendance System

    • 17976 Words
    • 72 Pages

    LIST OF FIGURES 2.1 General Block Diagram. 18_ 2.2 Block Diagram Showing Inside View of Controller Section. 20_ 2.3 RFID Module. 23_ 3.1 Entire Circuit Diagram. 24_ 3.2 Controller Section Circuit Diagram.

    • 17976 Words
    • 72 Pages
    Decent Essays
  • Better Essays

    Unmanned Railway Gate

    • 10530 Words
    • 43 Pages

    INDEX 1. INTRODUCTION 2. EMBEDDED SYSTEM 2.1 Definitions 2. Examples Of Embedded Systems 3. Microprocessor and Microcontroller 4. Microprocessor verses Microcontroller 3. BLOCK DIAGRAM 3.1.1 Block Diagram Description 3.1.2 555 Timers 3.1.3 Infrared Sensor 3.1.4 Microcontroller (89S52) 3.1.5 Power Supply 4. CIRCUIT DIAGRAM 4.1.1 555 Timers 4.1.2 Infrared Emitted Diode(TSAL 6200) 4.1.3 IR Receiver(TSOP) 4. DTMF

    • 10530 Words
    • 43 Pages
    Better Essays
  • Better Essays

    Red Hat Enterprise Linux 6 Security Guide 1 Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux Edition 3 Red Hat Engineering Content Services 2 Legal Notice Legal Notice Copyright © 2011 Red Hat, Inc. Based on the Fedora Security Guide (current version at http://docs.fedoraproject.org/enUS/Fedora/16/html/Security_Guide/index.html), written by Johnray Fuller, Eric Christensen, Adam Ligas, and other Fedora Project contributors. T he text

    • 50668 Words
    • 203 Pages
    Better Essays
  • Better Essays

    INVITED PAPER Cognitive Radio and Networking Research at Virginia Tech A large research team with a wide range of expertiseVfrom ICs and reconfigurable computing to wireless networkingVworks to achieve the promise of cognitive radio. By Allen B. MacKenzie, Senior Member IEEE , Jeffrey H. Reed, Fellow IEEE , Peter Athanas, Senior Member IEEE , Charles W. Bostian, Fellow IEEE , R. Michael Buehrer, Senior Member IEEE , Luiz A. DaSilva, Senior Member IEEE , Steven W. Ellingson, Senior Member IEEE

    • 23281 Words
    • 94 Pages
    Better Essays