Thursday 10 November 2011

Vulnerabilities and Exploits

In this week I learned about vulnerabilities and exploits and what they are, which ended up being a flaw in a program or taking advantage of program vulnerabilities. I was late shown examples of vulnerabilities like race condition or spoofing. Spoofing went from faking a mac address to dressing up and pretending to be someone else. The race condition was when a program runs it runs the protocols in a a,b a,b formation, ALWAYS. If b comes before a at all the program will crash or blue screen.

No comments:

Post a Comment