Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Identity management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
which is the best buffer overflow detection technique?
In this new world of zero tollerance for abends and the goal of 100% production stability, I have been charged with determining the best method to prevent abends due to internal program table overflows. Our environment has Cobol, Eztrieve and Assembler programs with internal tables. We are...
Buffer length more than record for member