In the early days, compilers for C and such had options that would check for buffer overflow. So many security issues these days seem to be due to the ability to overflow a buffer and get into memory areas the hacker isn’t supposed to have access to.
Maybe there needs to be more effort put toward making applications bullet-proof in the beginning, rather than the constant patching that goes on.
We could stop writing so much stuff in C? Ruby, Python, Java, and others are immune from buffer overflow.
Saturday 12-2 PM Eastern585-966-5299 or 1-800-790-0415Or text us at 585-209-9010And listen live on Jazz 90.1!or watch us on our very own YouTube channel!
Or, of course:
Hey, Google! Play Jazz 90.1
Alexa: Play Jazz 90.1
Enjoy Sound Bytes? Please help keep this site alive!