Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
note_on_buffer_overflows [2008/10/26 21:29] vkuncak |
note_on_buffer_overflows [2008/10/26 21:33] vkuncak |
||
---|---|---|---|
Line 10: | Line 10: | ||
that received this request, there were varied consequences. If the exploit was successful, Code Red began executing on the new victim host." | that received this request, there were varied consequences. If the exploit was successful, Code Red began executing on the new victim host." | ||
- | and shows the world-wide economic impact to be $2.62 billion. | + | and shows the world-wide economic impact to be **$2.62 billion**. |
Many of such errors could be prevented with memory-safe languages such as Java and Scala. | Many of such errors could be prevented with memory-safe languages such as Java and Scala. | ||
+ | |||
+ | The occurrences of these errors were reduced subsequently by a serious push within the company to adopt programming language discipline and tools that effectively turns C into a language where array accesses can be checked to be within bounds. | ||
+ |