OS Security does claim OSsurance detects buffer overflow attacks on programs running on your computer, using a...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
patent-pending method of protection. It blocks the execution of the malicious code by ensuring system resources are being used only by legitimate code. By checking the memory page attributes pointed to by the return address of the running process, it can stop the buffer overflow attack from crashing your computer. Their site states that they support Windows 2000 and Windows 2003 server, so, I suggest you download and test the fully functional 60-day trial copy so you can evaluate its performance and effectiveness firsthand.
Dig Deeper on Application Attacks (Buffer Overflows, Cross-Site Scripting)
Related Q&A from Michael Cobb
Many large enterprises have their own internal public key infrastructure. Expert Michael Cobb explains the considerations organizations should make ...continue reading
Network administrators typically resist policies for separate accounts when performing different tasks. Expert Michael Cobb explains the risk of ...continue reading
Microsoft is banning weak passwords on many of its services with the Smart Password Lockout feature. Expert Michael Cobb explains how it works, and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.