1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
13

Is the program vulnerable? (i.e., can the attacker exploit the buffer overflow and alter the saved return address?) Explain your

answer. (4 marks)
Computers and Technology
1 answer:
Savatey [412]3 years ago
3 0

Answer:

The answer is "False".

Explanation:

Some information that could be true/false may be missing the given statement can be described as follows:  

  • The given statement is false because the software is not responsive. The buffer begins on 0xbfffe780 and returns the new address, which starts with the 28 bytes, it is higher than at 0xbfffe79c, that's why it is necessary to override 25 bytes if you need to attach 32 bytes to overwrite the buffer.
  • Vulnerability is also defined as a weakness that a malicious actor, for instance, to attach, an exploit to take illegal action inside a computer network.
You might be interested in
How to make a message appear in more than one slack channel
VMariaS [17]

Answer:

On your desktop, hover over the message you'd like to share and click the Share message icon on the right. Use the drop-down menu to choose where you'd like to share the message, and add a note if you'd like. Click Share to see the message expand.

Explanation:

7 0
3 years ago
Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
Elodia [21]
I'm not a hundred percent sure but maybe silverlight?
5 0
3 years ago
What can a user do using the Contact Group dialog box? Check all that apply.
RSB [31]

Answer:

1,2,4,5,7

Explanation:

Had the question

3 0
2 years ago
Read 2 more answers
Question 1 of 19
shusha [124]

Answer:

UI Character Presets

Explanation:

User Interface is an option or go-to menu in a desktop application. For example, Photoshop. It allows a user to tweak the outlook to his or her own preference rather than the default settings.

To do this, a user is often tasked to do the following:

1. Click on the "Edit" menu

2. Navigate and click on "Preferences"

3. Select the "Interface" link

The options available to change includes:

a. UI Scaling

b. UI Font Size

c. UI Language.

Hence, in this case, the element that is not a selection in the Interface preferences is "UI Character preset"

7 0
3 years ago
Overloading in methods are popular in programming, and why overloading is important.
Cerrena [4.2K]

Answer:

 Yes, overloading is one of the methods which are popular in programming language. Overloading basically refers to the same function but different signature called function overloading or method overloading. It is the ability to define the multiples method by using the single identifier.

The overloading is important because it has the ability to design the multiple method by using similar name. It also provide the high flexibility to the programmers to call the same method in the data. overloading basically provide the high clarity in the code.

Overloading is used to achieved the compile time polymorphism.  

Following are program of function overloading in c++ are:

Class abc // creating class

{

public:

int p;

void fun() // function fun with no parameter/

{

cout<<” hello “;

}

void fun(int a) // function fun with parameter

{

p=a;

cout<<p;

}

};

int main() // main function

{

abc ob; // creating object

ob.fun();// print hello;

ob.fun(6);// print 6

return 0;

}

Explanation:

In this program the function fun() have same name but different signature in the main method we create the object of class abc i.e ob. ob.fun() this statement called the function with no parameter and ob.fun(6) this statement will called the function with integer parameter.

5 0
3 years ago
Other questions:
  • The data selected to create a table must include
    10·2 answers
  • What is the main difference between a literacy society and a digital Society
    9·1 answer
  • Which computer network component allows data transfers from one computer to another through a telephone line?
    11·2 answers
  • • The length of time between water level measurements/ control adjustments is DT. • If the water level drops to the bottom of th
    13·1 answer
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • The convergence of information technology and operations technology, offering the potential for tremendous improvements in effic
    14·1 answer
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    15·1 answer
  • When a JSP page is compiled, what is it turned into?
    11·1 answer
  • Input is information a system uses to monitor and adjust itself to meet the goal.
    8·1 answer
  • C
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!