wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffer Overflow

profile
Vrudanshi Bavliya
Sep 10, 2024
0 Likes
0 Discussions
78 Reads

What is Buffer? 

A buffer is a temporary data storage area with limited storage capacity. A buffer is typically area in the memory that is used to transfer data from one location to another location. Buffers are basically allocated in RAM to the processes. When any program is executed, it is loaded into RAM and some memory is temporarily allocated to the program called Buffer. 

How Buffer overflows? 

Buffer overflow is an attack that occurs when the amount of data that is submitted is larger than the buffer. For example in C, we create array of size 5. If the user enters data > 5,then it will override the data stored in memory further. Buffer are the container for data and in buffer overflow we stuff too much information into the container.

How to protect against buffer overflow? 

Basically this type of buffer is possible due to poorly written application code or operating system code. To protect against buffer overflow attacks programmers as well as organisation needs to ensure:-

1. Program should properly test/handle all the overflow conditions. 

2. Organisation should ensure all the operating systems and applications are update with latest updates, service packs and patches.



Comments ()


Sign in

Read Next

Wedding photographer

Blog banner

What is metaverse?

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Direct memory access (DMA)

Blog banner

Elements and Principles of Photography

Blog banner

Linux

Blog banner

Answer

Blog banner

Data Mining

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Mobile Survey

Blog banner

De-Coding Love

Blog banner

Deadlock and Starvation

Blog banner

Whatsapp Messenger

Blog banner

File System

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Cyber Forensic in the Banking sector

Blog banner

What is Network Security?

Blog banner

Operating Systems

Blog banner

How to feel Happy everyday day

Blog banner

Pooja Silver

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Threads

Blog banner

What is Spyware? and examples of them.

Blog banner

Fashion design

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

MACHINE LEARNING

Blog banner

Elegant fashion style

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Deming’s Process

Blog banner

Deadlock and Starvation

Blog banner

How Harshad Valia International School is nurturing India’s Young Minds?

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Article on IT development trends

Blog banner

Virtual machine and virtualizing

Blog banner

Self-love: Being the reason of your own smile

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Memory Hierarchy

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Emerging threats in cyber Forensics

Blog banner

Steganography and Steganalysis

Blog banner