¡@

Home 

c++ Programming Glossary: attacks

Refusing connection from a host

http://stackoverflow.com/questions/1116225/refusing-connection-from-a-host

to protect itself and the application from SYN flood attacks. Although not portable many platforms provide some sort of firewall..

How do you handle strings in C++?

http://stackoverflow.com/questions/133364/how-do-you-handle-strings-in-c

standard Protected against buffer overflows and similar attacks Are easily converted to other types as needed Are nicely templated..

Can you help me get my head around openssl public key encryption with rsa.h in c++?

http://stackoverflow.com/questions/2012645/can-you-help-me-get-my-head-around-openssl-public-key-encryption-with-rsa-h-in-c

allowing attackers to trivially perform block replacement attacks and worse . The EVP_ functions generate an appropriate IV for..

How do I programatically collect packets from passively sniffing?

http://stackoverflow.com/questions/3798733/how-do-i-programatically-collect-packets-from-passively-sniffing

of the server I just wrote against man in the middle attacks. How on Mac OS X do I analyze packets. I'll be checking where..

send RSA public key to iphone and use it to encrypt

http://stackoverflow.com/questions/4211484/send-rsa-public-key-to-iphone-and-use-it-to-encrypt

with the server's public key. It's not subject to MITM attacks unless the attacker has a copy of your private key and its password.. the cert from your server but then you're open to MITM attacks again . By default OpenSSL generates a PEM encoded cert so you..

How to Build a custom simple DNS server in C/C++ [closed]

http://stackoverflow.com/questions/649618/how-to-build-a-custom-simple-dns-server-in-c-c

particularly if you want decent security. Recent DNS attacks have shown that the cacheing function in recursive DNS servers..

How to hide strings in a exe or a dll?

http://stackoverflow.com/questions/926172/how-to-hide-strings-in-a-exe-or-a-dll

later. Or some combination thereof. Bear in mind that some attacks go further than looking at the actual binary. Sometimes they..