OS Security does claim OSsurance detects buffer overflow attacks on programs running on your computer, using a...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
patent-pending method of protection. It blocks the execution of the malicious code by ensuring system resources are being used only by legitimate code. By checking the memory page attributes pointed to by the return address of the running process, it can stop the buffer overflow attack from crashing your computer. Their site states that they support Windows 2000 and Windows 2003 server, so, I suggest you download and test the fully functional 60-day trial copy so you can evaluate its performance and effectiveness firsthand.
Dig Deeper on Application Attacks (Buffer Overflows, Cross-Site Scripting)
Related Q&A from Michael Cobb
Google has added Linux kernel memory protection and other security measures to the Android OS. Expert Michael Cobb explains how these features work ...continue reading
The HummingBad malware has infected 10 million mobile devices worldwide. Expert Michael Cobb explains how this exploit enables click fraud and other ...continue reading
A full account access OAuth token was mistakenly issued to the Pokémon GO mobile game by Google. Expert Michael Cobb explains the security risks and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.