Those who have read my reviews of parts of the second edition of “Hacking: The Art of Exploitation” by Jon Erickson may not be surprised to see that I am continuing this series of reviews of sections of that book. At the end of my review of the third chapter of that book, I mentioned […]
Archives
- December 2009
 - November 2009
 - October 2009
 - September 2009
 - August 2009
 - July 2009
 - June 2009
 - May 2009
 - April 2009
 - March 2009
 - February 2009
 - January 2009
 - December 2008
 - November 2008
 - October 2008
 - September 2008
 - August 2008
 - July 2008
 - June 2008
 - May 2008
 - April 2008
 - March 2008
 - February 2008
 - January 2008
 - December 2007
 - November 2007
 - October 2007
 - September 2007
 - August 2007