by Milan Gardian
Notes on updating your WTL installation
by Oscar-Tark
In this article, we will be looking at a more advanced version of a buffer overflow attack.
by Michael Vasquez
This article includes a simple address book application in Perl.
by Paul Lessard, M.Sc.
We propose a way to secure C# programs by emulating Taint checking