CoreTrace Whitepaper: Combating Buffer Overflows And Rootkits

  • 540 views
Uploaded on

Whitepaper Abstract …

Whitepaper Abstract
Some malware threats are simply nuisances, and then there are truly dangerous and malicious ones. In the latter category, buffer overflow attacks and rootkits are the favorites of professional hackers. Often they are used in tandem, with a buffer overflow providing the way in and a rootkit providing a highly stealthy way to stay in.

This whitepaper explains these two threats and why traditional security approaches have been largely ineffective against them. Then the paper outlines how Endpoint Security 2.0 solutions using kernel-level application whitelisting can effectively neutralize the threats and provide greater peace of mind.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
540
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
20
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. What is height of Secrecy? Offering blank visiting cards.
  • 2. What is height of laziness? Asking for a lift to house while on a morning walk
  • 3. What is height of Craziness? Getting a blank paper Xeroxed.
  • 4. What is height of Forgetfulness? Seeing the mirror and trying to recollect when you saw him / her last.
  • 5. What is height of Stupidity? A man looking through a keyhole of a glass door.
  • 6. What is height of Honesty? A pregnant woman taking one and a half ticket.
  • 7. What is height of Suicide? A dwarf jumping from the footpath on the road.
  • 8. What is height of De-hydration? A cow giving milk powder.