MENU
Library HOME > Library > º¸¾È ÄÁÅÙÃ÷

º¸¾È ÄÁÅÙÃ÷


Defeating Overflow Attacks

¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow) ¹öÆÛ°¡ °¡Áö°í ÀÖ´Â ¹öÆÛ ¿µ¿ª¹Û¿¡ µ¥ÀÌÅÍ°¡ ¾²¿©Áö°Ô µÉ¶§ ¹ß»ý ¹öÆÛ ¿µ¿ª ¹ÛÀÇ µ¥ÀÌÅÍ°¡ ½Ã½ºÅÛÀÇ Áß¿ä ¿¹¾à ¿µ¿ªÀ» ħ¹üÇÔ ÀϹݻç¿ëÀÚ: Segmentation fault ÇØÄ¿: ¹öÆÛ¹ÛÀÇ ¾²¿©Áö´Â µ¥ÀÌÅ͸¦ Á¤È®ÇÏ°Ô ¿¹»óÇÏ°í °íÀÇ·Î ¹öÆÛ¹Û¿¡ µ¥ÀÌÅ͸¦ ¾²¿©Áö°Ô ÇÔ ÀÌ ¹®¼­ÀÇ ¿¹Á¦ C language, IA-32 Intel, Slackware Linux Ver 9.1

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 86 / Á¶È¸¼ö : 5826 / Ãßõ :
ÀÛ¼ºÀÚ : ¹ÚÂù¿ë / ÀÛ¼ºÀÏÀÚ : 2009.12.14
Building a More Secure Network

¾ÈÀüÇÏ°Ô °í¾ÈµÈ ³×Æ®¿öÅ© topography´Â °ø±ÞÀÚ¿Í °í°´ °ü¸®ÀÚ »çÀÌÀÇ °øÅëÀûÀÎ ÁÖÁ¦ÀÌ´Ù. ±×·¯³ª ¾ÈÀüÇÑ ³×Æ®¿öÅ© µðÀÚÀÎÀº ¸Å¿ì ºñ½Ñ Çϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î·Î ÀÌ·ç¾îÁö´Â ¾Ê´Â´Ù. ±×°ÍÀº ¸é¹ÐÇÑ Àü·«°ú ¹«·á·Î »ç¿ë°¡´ÉÇÑ °ø°³ ¼ÒÇÁÆ®¿þ¾î·Î ÀÌ·ç¾î Áú¼ö ÀÖ´Ù. ÀÌ ¹®¼­¿¡¼­ ¾ÈÀüÇÑ ³×Æ®¿öÅ© µðÀÚÀο¡ °üÇÑ ÅÛÇø´À» º¼°Ô µÉ °ÍÀÌ°í, ¿¹»ê ¸é¿¡¼­ ÀûÀº ºñ¿ëÀ¸·Î ¾î¶»°Ô °æ°è ¿µ¿ª°ú ³»ºÎ ¿µ¿ª»çÀ̸¦ ÅëÇÕÇÒ ¼ö ÀÖÀ»±î...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 80 / Á¶È¸¼ö : 5743 / Ãßõ :
ÀÛ¼ºÀÚ : George Rosamond / ÀÛ¼ºÀÏÀÚ : 2009.12.13
SMB ±â¾÷ º¸¾È °¡À̵å

ÀÎÅͳݰú ÃÖ±ÙÀÇ ¼¼°èÀû À̺¥Æ®·Î ÀÎÇØ ±â¾÷ÀÌ º¸¾È¿¡ Á¢±ÙÇÏ´Â ¹æ½ÄÀÌ ±Ùº»ÀûÀ¸·Î ¹Ù²î¾ú½À´Ï´Ù. ºÒ°ú 10³â Àü¸¸ Çصµ ³×Æ®¿öÅ© º¸È£´Â ¾î¶»°Ô Çؼ­µç »ç¶÷µéÀÌ Á¢±ÙÇÏÁö ¸øÇϵµ·Ï ÇÏ´Â µ¥ ÁßÁ¡À» µÎ¾ú½À´Ï´Ù. ¿ÜºÎÀÎÀÌ ±â¾÷ÀÇ ½Ã½ºÅÛ¿¡ ¾×¼¼½ºÇÑ´Ù´Â °ÍÀº ½É°¢ÇÑ ¹®Á¦·Î °£ÁֵǾú½À´Ï´Ù. ¿À´Ã³¯Àº À¥ ¹× ³×Æ®¿öÅ©È­µÈ e-ºñÁî´Ï½º ¾ÖÇø®ÄÉÀ̼Ç, ÀçÅà ±Ù¹«, Áö»ç ¿¬°á, ÆÄÆ®³Ê ¿¬°á, ¹«¼± À̵¿¼ºÀÌ Á¡Á¡ ´õ Áß¿äÇÑ Åø·Î ºÎ°¢µÇ...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 112 / Á¶È¸¼ö : 5978 / Ãßõ :
ÀÛ¼ºÀÚ : Á¤ Á¾ ¸í / ÀÛ¼ºÀÏÀÚ : 2009.12.12
A guide for Small & Mid-sized Business

º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted Their data is not high-value intellectual property & not sensitive proprietary data ±×·¯³ª, SMB°¡ °ø°Ý ¹Þ±â ½¬¿î ÀÌÀ¯ Homogeneous computing infrastructure; Accor...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 74 / Á¶È¸¼ö : 6177 / Ãßõ :
ÀÛ¼ºÀÚ : Á¤Á¾¸í / ÀÛ¼ºÀÏÀÚ : 2009.12.11
ÀÎÅÍ³Ý °ø°ÝÀÇ ´ëÀÀ¹æ¹ý

ÀûÀÇ ¸ðµç °ÍÀ» È®ÀÎÇØ º¸ÀÚ! ¡°Military action is important to the nation ? it is the ground of death and life, the path of survival and destruction, so it is imperative to examine it (Tzu, p.41).¡±

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 104 / Á¶È¸¼ö : 5890 / Ãßõ :
ÀÛ¼ºÀÚ : ½Å¿µÂù / ÀÛ¼ºÀÏÀÚ : 2009.12.10
¼º°øÀûÀÎ º¸¾È ÇÁ·Î±×·¥À» À§ÇÑ °³¿ä

º¸¾È Á¤Ã¥ º¸¾È Á¤Ã¥Àº ¿Ö ÇÊ¿äÇÑ°¡? º¸¾È ÇÁ·Î±×·¥ÀÇ ÇÙ½É È¸»çÀÇ ¾î´À ºÎºÐ¿¡¼­ ¾î¶² º¸¾ÈÀÌ ÇÊ¿äÇÑÁö Á¤ÀÇ º¸¾È Á¤Ã¥°ú º¸¾È ÀýÂ÷ÀÇ Â÷ÀÌ Á¤Ã¥: °èÃþ ±¸Á¶·Î º¸¾ÒÀ» ¶§ ÃÖ»óÀ§¿¡ À§Ä¡. °£´Ü ¸í·áÇؾßÇÔ. ÀýÂ÷: Á¤Ã¥ÀÌ ÀǹÌÇÏ´Â ¹Ù¸¦ ¾î¶»°Ô ¼öÇàÇÒÁö¸¦ ¼³¸í

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 97 / Á¶È¸¼ö : 4733 / Ãßõ :
ÀÛ¼ºÀÚ : ÀÌâ¹è / ÀÛ¼ºÀÏÀÚ : 2009.12.09
½ºÅ×°¡³ë±×¶óÇÇ (Steganography)

What is the steganography? Definition To hide even the occurrence of messages. Often called ¡°stego¡±. Stegonography vs. Cryptography Stegonography is to conceal even the occurrence of a message. Cryptography reveals itself by scram...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 112 / Á¶È¸¼ö : 8990 / Ãßõ :
ÀÛ¼ºÀÚ : ÀÌÈ«·Î / ÀÛ¼ºÀÏÀÚ : 2009.12.08
Biometrics Standards

ISO/IEC JTC 001 "Information technology" SC 37 "Biometrics" WG 01 "Harmonized Biometric Vocabulary and Definitions" WG 02 "Biometric Technical Interfaces" WG 03 "Biometric Data Interchange Formats" WG 04 "Study Group on Profiles f...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 65 / Á¶È¸¼ö : 6689 / Ãßõ :
ÀÛ¼ºÀÚ : ±èµÎ½Ä / ÀÛ¼ºÀÏÀÚ : 2009.12.07
Àü»êÇм¼¹Ì³ª1 °­À¯À§ ÇØÅ·&º¸¾È ³ëÇÏ¿ì

ÀÎÅÍ³Ý ÇØÅ·Àº ±¹°¡Àû »çÀ̹ö°ø°£ÀÇ ¿µ¿øÇÑ ¹®Á¦°Å¸®ÀÌ¸ç º¸¾ÈÀü¹®°¡°¡ µÇ±â À§Çؼ­´Â ½ÇÁ¦ ÇØÅ·±â¹ýÀ» ¸ð¸£°í´Â °¡´ÉÇÏÁö ¾ÊÀ¸¹Ç·Î ±¹³» º¸¾ÈÀü¹®°¡°¡ ¾´ ¼­ÀûÀ» ¹ÙÅÁÀ¸·Î ºÐ¾ßº° ÇØÅ·±â¹ýÀ» ¼¼¹Ì³ª¸¦ ÅëÇÏ¿© ¾Ë¾Æº»´Ù. ½ÇÁ¦ ÇØÅ·µµ±¸¸¦ ºÐ¼®, ¿¬±¸, ½Ã¿¬ ¹× ¼Ò½ººÐ¼® µîÀ» Çϸç, ÇâÈÄ ³ªÅ¸³¯ º¸¾È°ø°Ý±â¹ýµîÀ» ¿¬±¸ÇÑ´Ù. À̸¦ ÅëÇÏ¿© Àü»êº¸¾È½Ç¹«ÀÚÀڰݽÃÇè µîÀ» ÁغñÇÏ¿© ½Ç¹«¸¦ ´ëºñÇÔ ÀÎÅÍ³Ý ÇØÅ·Àº ±¹°¡Àû »çÀ̹ö°ø°£ÀÇ ¿µ¿øÇÑ ¹®...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 127 / Á¶È¸¼ö : 5269 / Ãßõ :
ÀÛ¼ºÀÚ : ÀÓäȣ / ÀÛ¼ºÀÏÀÚ : 2009.12.06
A Disgruntled Employee Gets His Revenge

ÀϹÝÀû Security Defense ±â¹ý External Threats ´ëºñ Firewall: Network ¿ë Personal Firewall: Host ¿ë Antivirus Software: Application ¿ë ´ëºÎºÐÀÇ ±â¾÷µéÀÌ µµ¿ë Internal Threats 2003 CSI/FBI Computer Crime and Security Àüü º¸¾È »ç°í Áß 77%°¡ ³»ºÎÀÚ ¼ÒÇà ÃßÁ¤ External ...

Æ÷ÀÎÆ® : ¹«·á / ´Ù¿î·Îµå : 108 / Á¶È¸¼ö : 7712 / Ãßõ :
ÀÛ¼ºÀÚ : ¼Û¼ºÈí / ÀÛ¼ºÀÏÀÚ : 2009.12.05
  101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110  


COPYRIGHT CISOKOREA.ORG. ALL RIGHTS RESERVED.
°³ÀÎÁ¤º¸Ã³¸®¹æħ