Design Con 2015
Welcome Guest Log In | Register

Memory Flaws Boot Camp

Posted on: Sep 14, 2012 | Duration: 60 min.
Course | 371 views
0 1
More Info +- Less Info

Denial of service attacks. Data leaks. System crashes. Malicious code execution.  All examples of the impact of exploited memory vulnerabilities in your code. As a diligent and security-conscious software developer, you need to arm yourself with the knowledge to defend your code against these issues.

Based on the top memory weaknesses identified by CWE, this no-charge eLearning course will describe the cause and security impact of these flaws, provide technical examples of each and offer strategies to help mitigate the risks they pose.

View

Please disable any pop-up blockers for proper viewing of this course.

1 comment
write a comment

No Avatar

William.Levick Posted Oct 9, 2012

Noticed that in the last few seconds of each segment the speakers diction became blurred, leading to uncertainty about the 'punch line' of the segment. This would inadvertently handicap a hearing-impaired listener, because there are no following sentences that might disambiguate the punch line. It is relatively common for the last few words of a final sentence to be pronounced with a different inflection. This is a habit started in the Elementary School peer-group and then maintained into adulthood. A work-round for speakers would be the instruction to repeat the last few words after a brief pause. There are undoubtedly other solutions as well. Bill Levick

reply

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page