End Buffer-Manipulation Exploit Threats
Doing nothing may be the best option when it comes to fighting virus and Trojan programmers.
June 18, 2004
1 Min Read
By forcing instructions to have permission from the OS before they can be executed, this technology should end threats from buffer-manipulation exploits that force unauthorized code past antivirus software into executable memory.
And this strategy is just getting started: Both Transmeta and Via Technologies plan to include the technology on future chips. Linux will get the benefit first, but life is going to get more difficult for worm writers across the spectrum--a very good thing indeed.
Read more about:
2004SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox
You May Also Like
More Insights