This project is in support of the 2nd annual Information Security COnference at California State University Northridge. The workshop was a presentation on buffer overflows and how they are exploited.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results