R/C, PC Security, and anything else that interests me at the time…
How to Exploit Overflow Vulnerability Under Fedora Core
Just follow the white rabbit… or was it this link?
New Order – computer security and networking portal
** This paper is based on beist(http://www.beist.org)’s wonderful article
“One Shot Overflow Attack Under Fedora Core2” **