|
||||||
½Ã½ºÅÛ º¸¾È °úÁ¦ | ||||||
¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow)´Â ¶§¶§·Î ÇØÄ¿°¡ ½Ã½ºÅÛÀÇ Á¦¾î±ÇÀ» °¡Áú¼ö ÀÖ´Â º¸¾ÈÀÇ Ãë¾àÁ¡ÀÌ µÉ¼ö ÀÖ´Ù. National Institute of Standard and Technologies ¿¡ µû¸£... |
||||||
´Ù¿î·Îµå : 114 / Á¶È¸¼ö : 5865 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ¹ÚÂù¿ë / ÀÛ¼ºÀÏÀÚ : 2009.12.15 | ||||||
Defeating Overflow Attacks | ||||||
¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow) ¹öÆÛ°¡ °¡Áö°í ÀÖ´Â ¹öÆÛ ¿µ¿ª¹Û¿¡ µ¥ÀÌÅÍ°¡ ¾²¿©Áö°Ô µÉ¶§ ¹ß»ý ¹öÆÛ ¿µ¿ª ¹ÛÀÇ µ¥ÀÌÅÍ°¡ ½Ã½ºÅÛÀÇ Áß¿ä ¿¹¾à ¿µ¿ªÀ» ħ¹üÇÔ ÀϹݻç¿ëÀÚ: Segmentation fault ... |
||||||
´Ù¿î·Îµå : 86 / Á¶È¸¼ö : 5855 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ¹ÚÂù¿ë / ÀÛ¼ºÀÏÀÚ : 2009.12.14 | ||||||
Building a More Secure Network | ||||||
¾ÈÀüÇÏ°Ô °í¾ÈµÈ ³×Æ®¿öÅ© topography´Â °ø±ÞÀÚ¿Í °í°´ °ü¸®ÀÚ »çÀÌÀÇ °øÅëÀûÀÎ ÁÖÁ¦ÀÌ´Ù. ±×·¯³ª ¾ÈÀüÇÑ ³×Æ®¿öÅ© µðÀÚÀÎÀº ¸Å¿ì ºñ½Ñ Çϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î·Î ÀÌ·ç¾îÁö´Â ¾Ê´Â´Ù. ±×°ÍÀº ¸é¹ÐÇÑ Àü·«°ú ¹«·á·Î »ç¿ë... |
||||||
´Ù¿î·Îµå : 80 / Á¶È¸¼ö : 5770 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : George Rosamond / ÀÛ¼ºÀÏÀÚ : 2009.12.13 | ||||||
SMB ±â¾÷ º¸¾È °¡À̵å | ||||||
ÀÎÅͳݰú ÃÖ±ÙÀÇ ¼¼°èÀû À̺¥Æ®·Î ÀÎÇØ ±â¾÷ÀÌ º¸¾È¿¡ Á¢±ÙÇÏ´Â ¹æ½ÄÀÌ ±Ùº»ÀûÀ¸·Î ¹Ù²î¾ú½À´Ï´Ù. ºÒ°ú 10³â Àü¸¸ Çصµ ³×Æ®¿öÅ© º¸È£´Â ¾î¶»°Ô Çؼµç »ç¶÷µéÀÌ Á¢±ÙÇÏÁö ¸øÇϵµ·Ï ÇÏ´Â µ¥ ÁßÁ¡À» µÎ¾ú½À´Ï´Ù. ¿ÜºÎÀÎÀÌ ±â¾÷... |
||||||
´Ù¿î·Îµå : 112 / Á¶È¸¼ö : 6008 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : Á¤ Á¾ ¸í / ÀÛ¼ºÀÏÀÚ : 2009.12.12 | ||||||
A guide for Small & Mid-sized Business | ||||||
º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted Their data is not high-value intellectua... |
||||||
´Ù¿î·Îµå : 74 / Á¶È¸¼ö : 6204 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : Á¤Á¾¸í / ÀÛ¼ºÀÏÀÚ : 2009.12.11 | ||||||
ÀÎÅÍ³Ý °ø°ÝÀÇ ´ëÀÀ¹æ¹ý | ||||||
ÀûÀÇ ¸ðµç °ÍÀ» È®ÀÎÇØ º¸ÀÚ! ¡°Military action is important to the nation ? it is the ground of death and life, the path of survival ... |
||||||
´Ù¿î·Îµå : 104 / Á¶È¸¼ö : 5925 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ½Å¿µÂù / ÀÛ¼ºÀÏÀÚ : 2009.12.10 | ||||||
¼º°øÀûÀÎ º¸¾È ÇÁ·Î±×·¥À» À§ÇÑ °³¿ä | ||||||
º¸¾È Á¤Ã¥ º¸¾È Á¤Ã¥Àº ¿Ö ÇÊ¿äÇÑ°¡? º¸¾È ÇÁ·Î±×·¥ÀÇ ÇÙ½É È¸»çÀÇ ¾î´À ºÎºÐ¿¡¼ ¾î¶² º¸¾ÈÀÌ ÇÊ¿äÇÑÁö Á¤ÀÇ º¸¾È Á¤Ã¥°ú º¸¾È ÀýÂ÷ÀÇ Â÷ÀÌ Á¤Ã¥: °èÃþ ±¸Á¶·Î º¸¾ÒÀ» ¶§ ÃÖ»óÀ§¿¡ À§Ä¡. °£´Ü ¸í·áÇؾßÇÔ. ÀýÂ÷: Á¤Ã¥ÀÌ... |
||||||
´Ù¿î·Îµå : 97 / Á¶È¸¼ö : 4762 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ÀÌâ¹è / ÀÛ¼ºÀÏÀÚ : 2009.12.09 | ||||||
½ºÅ×°¡³ë±×¶óÇÇ (Steganography) | ||||||
What is the steganography? Definition To hide even the occurrence of messages. Often called ¡°stego¡±. Stegonography vs. C... |
||||||
´Ù¿î·Îµå : 112 / Á¶È¸¼ö : 9024 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ÀÌÈ«·Î / ÀÛ¼ºÀÏÀÚ : 2009.12.08 | ||||||
Biometrics Standards | ||||||
ISO/IEC JTC 001 "Information technology" SC 37 "Biometrics" WG 01 "Harmonized Biometric Vocabulary and Definitions" WG 0... |
||||||
´Ù¿î·Îµå : 65 / Á¶È¸¼ö : 9448 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ±èµÎ½Ä / ÀÛ¼ºÀÏÀÚ : 2009.12.07 | ||||||
Àü»êÇм¼¹Ì³ª1 °À¯À§ ÇØÅ·&º¸¾È ³ëÇÏ¿ì | ||||||
ÀÎÅÍ³Ý ÇØÅ·Àº ±¹°¡Àû »çÀ̹ö°ø°£ÀÇ ¿µ¿øÇÑ ¹®Á¦°Å¸®ÀÌ¸ç º¸¾ÈÀü¹®°¡°¡ µÇ±â À§Çؼ´Â ½ÇÁ¦ ÇØÅ·±â¹ýÀ» ¸ð¸£°í´Â °¡´ÉÇÏÁö ¾ÊÀ¸¹Ç·Î ±¹³» º¸¾ÈÀü¹®°¡°¡ ¾´ ¼ÀûÀ» ¹ÙÅÁÀ¸·Î ºÐ¾ßº° ÇØÅ·±â¹ýÀ» ¼¼¹Ì³ª¸¦ ÅëÇÏ¿© ¾Ë¾Æº»´Ù. ½ÇÁ¦ ÇØÅ·... |
||||||
´Ù¿î·Îµå : 127 / Á¶È¸¼ö : 5297 / Ãßõ : | ||||||
ÀÛ¼ºÀÚ : ÀÓäȣ / ÀÛ¼ºÀÏÀÚ : 2009.12.06 | ||||||
101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 |
1
¡°´ç½ÅÀÇ Å¬¸¯À» ÈÉÄ¡°Ú½À´Ï´Ù¡±°¡ ¡°´ç½ÅÀÇ ´õ...2
[ÇÑ ÁÖ¸¦ °üÅëÇÏ´Â º¸¾È ¼Ò½Ä] 2025³â ...3
[¿µÈ&º¸¾È] <Æ®·£½ºÆ÷¸Ó 1>°ú ¿äÁò ½º¸±...4
Ú¸ À繫ºÎ, ÇØÅ· ÇøÀÇ·Î ñé ±â¾÷ ¡®Inte...5
[2025³â º¸¾È ÇÖ Å°¿öµå-3] »çÀ̹ö »ç...¡¸¿¸°º¸µµ¿øÄ¢¡¹ ´ç ¸Åü´Â µ¶ÀÚ¿Í ÃëÀç¿ø µî ´º½ºÀÌ¿ëÀÚÀÇ ±Ç¸® º¸ÀåÀ» À§ÇØ ¹Ý·ÐÀ̳ª Á¤Á¤º¸µµ, ÃßÈ帵µ¸¦ ¿äûÇÒ ¼ö Àִ â±¸¸¦ ¿¾îµÎ°í ÀÖÀ½À» ¾Ë·Áµå¸³´Ï´Ù.
°íÃæó¸®ÀÎ ±Ç ÁØ(editor@boannews.com)