Skip to main content

Buffer Overflow detection and prevention tool from Comodo

One of the most serious and common types of attack on the Internet is buffer overflow attack. A buffer overflow occurs when a program attempts to store more data into a buffer than the space it has allocated in the memory.

The ability to exploit a buffer overflow allows an attacker to over write data to control the program execution path. This allows hackers to access our system remotely by executing his (their) code instead the process code.

Comodo Memory Firewall Constantly monitors the memory space and activity of the installed applicationsto make sure they do not fall prey to buffer-overflow attacks – a favorite and very damaging technique used by hackers to crash your system and steal your confidential information.

Comodo Memory Firewall detects the following types of attack:
  • Detection of Buffer Overflows which occur in the STACK memory,
  • Detection of Buffer Overflows which occur in the HEAP memory,
  • Detection of ret2libc attacks,
  • Detection of corrupted/bad SEH Chains
Installation is simple and default setting is enough to prevent the attack. More details available in the help file included.
Supports Windows Vista (Both 32-bit and 64-bit versions) / Windows XP (Both 32-bit and 64-bit versions) / Windows Server 2003 SP1 (32 bit and 64 bit versions)
License:Free / Download

Comments

  1. Thanks to the info. This type of attack is new to me.

    ReplyDelete

Post a Comment

Please leave your valuable comment below

Popular posts from this blog

Surf the Web Anonymously With Firefox Add-on Phproxy

There are several web based proxy servers available to surf the internet anonymously or as from another country. The Firefox add-on (Firefox 3 – 4) Phzilla helps you view a webpage or surf the internet using the PHProxy (a type of web based proxy server) proxy servers. It is very easy and convenient to use.

Restore Lost Capacity Of Your USB Flash Drive (How to)

Some malware can hide full capacity of your USB flash drive. For example, a 4GB pen drive sometimes shows only 500kb or less. An interesting part of this situation is that, even after removing the malware or formatting the USB flash drive, you will not get back its original capacity. Therefore, the question here is how to restore a USB flash drive to its full capacity.

Privacy Policy

We at www.jkwebtalks.com give prime importance to our users’ privacy and are committed to protecting it always. If you have any doubt concerned with our website privacy policy or software, please feel free to contact us. Please read our Privacy Policy below to learn more about how we treat personally identifiable information, how it is protected and used. Log Files: www.jkwebtalks.com does NOT collect any personally-identifiable information, such as name, address, phone number or email address from users of this web site without their knowledge, and takes measures to protect their privacy. However, like other standard web site servers, we use log files to collect information purely to identify the number of visitors to this web site, what those visitors looked at and how long they spent browsing. These information will only be used to judge the popularity of this web site and to make future improvements.These includes IP address, internet service provider, type of browser, date/ti