Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Buffer

Related Topics

In the News (Tue 23 Apr 19)

  Buffer overflow - Wikipedia, the free encyclopedia
A buffer overflow occurs when data written to a buffer, due to insufficient bounds checking, corrupts data values in memory addresses adjacent to the allocated buffer.
A buffer overflow occurring in the heap data area is referred to as a heap overflow and is exploitable in a similar manner to that of stack-based overflows since memory on the heap is dynamically allocated by the application at run-time and typically contains program data.
The earliest known exploitation of a buffer overflow was in 1988.
en.wikipedia.org /wiki/Buffer_overflow   (2209 words)

 Buffer - Wikipedia, the free encyclopedia
Buffer (telecommunication), a routine or storage medium used to compensate for a difference in rate of flow of data between devices
Buffer amplifier (also sometimes simply called a buffer) is an isolating circuit used in electronics or telecommunications
Buffer is common title for character classes which primary function is to enhance other character's abilities (most often in some magic way).
en.wikipedia.org /wiki/Buffer   (286 words)

 Buffer (Java 2 Platform SE 5.0)
A buffer is a linear, finite sequence of elements of a specific primitive type.
A newly-created buffer always has a position of zero and a mark that is undefined.
This method does not actually erase the data in the buffer, but it is named as if it did because it will most often be used in situations in which that might as well be the case.
java.sun.com /j2se/1.5.0/docs/api/java/nio/Buffer.html   (1085 words)

 CERT® Advisories
A buffer overflow exists in the ActiveX control that may permit a remote attacker to execute arbitrary code on the system with the privileges of the current user.
A buffer overflow exists in the Solaris BSD-style line printer daemon, in.lpd, that may allow a remote intruder to execute arbitrary code with the privileges of the running daemon.
There is a buffer overflow vulnerability in the logging facility of the amd daemon.
www.cert.org /advisories   (10714 words)

 Risk Managment & Buffer Management   (Site not responding. Last check: 2007-11-07)
Buffer Management typically involves a combination of real-time access to buffer condition and periodic “buffer management meetings.” Real-time, daily updates of project and buffer status are feasible in a Critical Chain environment due to the simple data needed to update active tasks.
Buffer consumption at any point in time is the result of all previous work, which can eat away at the buffer quietly but insidiously as the project progresses.
If buffer consumption is tracked against the amount of chain completed, or alternatively if buffer remaining is tracked against the amount of buffer required to protect what remains of the chain, trends of diminishing buffer condition or the crossing of pre-determined thresholds will serve to identify indications of risk for the project as a whole.
focusedperformance.com /articles/ccrisk6.html   (1407 words)

 Define buffer overflow - a definition from Whatis.com   (Site not responding. Last check: 2007-11-07)
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.
In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information.
Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.
searchsecurity.techtarget.com /sDefinition/0,,sid14_gci549024,00.html   (415 words)

 Info Node: (emacs)Buffers   (Site not responding. Last check: 2007-11-07)
Using Multiple Buffers ********************** The text you are editing in Emacs resides in an object called a "buffer".
Each buffer records individually what file it is visiting, whether it is modified, and what major mode and minor modes are in effect in it (Note: Major Modes).
A buffer's size cannot be larger than some maximum, which is defined by the largest buffer position representable by the "Emacs integer" data type.
www.cs.cmu.edu /cgi-bin/info2www?(emacs)Buffers   (384 words)

 Define buffer - a definition from Whatis.com   (Site not responding. Last check: 2007-11-07)
A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
In order for a buffer to be effective, the size of the buffer and the algorithms for moving data into and out of the buffer need to be considered by the buffer designer.
Like a cache, a buffer is a "midpoint holding place" but exists not so much to accelerate the speed of an activity as to support the coordination of separate activities.
searchsmb.techtarget.com /sDefinition/0,,sid44_gci211713,00.html   (217 words)

 What is buffer? - A Word Definition From the Webopedia Computer Dictionary
The purpose of most buffers is to act as a holding area, enabling the CPU to manipulate data before transferring it to a device.
Because the processes of reading and writing data to a disk are relatively slow, many programs keep track of data changes in a buffer and then copy the buffer to a disk.
When you enter a PRINT command, the operating system copies your document to a print buffer (a free area in memory or on a disk) from which the printer can draw characters at its own pace.
www.webopedia.com /TERM/b/buffer.html   (391 words)

 Tuning the Log Buffer Size
Normally, tuning the log buffer size is a matter of careful balance, but you can have your cake and eat it too by using the hidden _log_io_size parameter.
The log buffer in the SGA is internally divided into blocks of the log block size.
Whenever a process allocates space in the log buffer, the number of used log buffer blocks is calculated.
www.ixora.com.au /tips/tuning/log_buffer_size.htm   (1232 words)

 Better Car Care :: http://bettercarcare.com   (Site not responding. Last check: 2007-11-07)
A professional painter’s buffer is nothing more than a body grinder with a polishing pad in place of the grinding disc.
Buffers have a straight drive to the polishing head (i.e., the polishing pad connects directly to the shaft of the motor).
The reason for lifting the left side of the buffer is to prevent the trailing edge of the buffing pad from driving into a body panel edge.
www.bettercarcare.com /articles.php?articleId=24   (2207 words)

 Buffer Overflow Attacks and Their Countermeasures | Linux Journal
A buffer is a contiguous allocated chunk of memory, such as an array or a pointer in C. In C and C++, there are no automatic bounds checking on the buffer, which means a user can write past a buffer.
When a buffer is passed as an argument to any of the unsafe functions, libsafe follows the frame pointers to the correct stack frame.
Buffer overflows would not be nearly the security nightmare they are if the root account were not all-powerful and if network and system daemons like apache were not run from the root account.
www.linuxjournal.com /article.php?sid=6701   (4585 words)

 Self-manage data buffer memory
That's followed by an abstract data buffer scheme, illustrated by a pseudo implementation, that solves many of those problems, followed by code snippets demonstrating the solution's benefits.
Because you must specify the size when a buffer is created under the conventional allocation scheme, a data provider, which presumably knows the size of the data it provides, is the best party to perform the buffer allocation operation.
Implementing this proposed abstract data buffer should be a relatively trivial task for an average C programmer.
www-128.ibm.com /developerworks/library/wa-memmng?ca=dgr-lnxw15-obg-DataMemory   (2330 words)

 buffer definition - isp.webopedia.com - The Glossary for Internet Service Providers
Note that because your changes are initially stored in a buffer, not on the disk, all of them will be lost if the computer fails during an editing session.
Buffers are commonly used when burning data onto a compact disc, where the data is transferred to the buffer before being written to the disc.
Another common use of buffers is for printing documents.
isp.webopedia.com /TERM/b/buffer.html   (341 words)

 : Camera System: Glossary: Learn: Digital Photography Review
Currently, most digital cameras have relatively large buffers which allow them to operate as quickly as a film camera while writing data to the storage card in the background (without interrupting your ability to shoot).
The location of the buffer within the camera system is normally not specified, but affects the number of images that can be shot in burst mode.
In cameras with this type of buffer, the number of frames which can be taken in burst mode cannot be increased by reducing image file size.
www.dpreview.com /learn?/Glossary/Camera_System/Buffer_01.htm   (531 words)

 AllRefer.com - buffer (Chemistry) - Encyclopedia
buffer, solution that can keep its relative acidity or alkalinity constant, i.e., keep its pH constant, despite the addition of strong acids or strong bases.
Buffer solutions are frequently solutions that contain either a weak acid and one of its salts or a weak base and one of its salts.
For example, blood must maintain a pH of close to 7.4 in order to carry oxygen from the lungs to cells; blood is therefore a powerful buffer.
reference.allrefer.com /encyclopedia/B/buffer.html   (198 words)

 Acid Buffer
Acid Buffer™ is a non-phosphate buffer to lower pH and buffer with Alkaline Buffer™.
Both buffers are designed for the planted aquarium or for very hard water where phosphate buffers may pose an algae or cloudiness problem.
Alkaline Buffer™ is a phosphate/caustic free buffer for raising and stabilizing pH in the alkaline range of pH 7.4–8.4.
www.seachem.com /products/product_pages/AcidBuffer.html   (278 words)

 Fix Those Buffer Overruns! (Code Secure)   (Site not responding. Last check: 2007-11-07)
When David LeBlanc and I defined the table of contents for Writing Secure Code, it was obvious that we had to focus on buffer overruns because so many developers make so many mistakes in their code that lead to exploitable buffer overruns.
Buffer overruns are primarily a C and C++ issue because these languages perform no array bounds checking and no type-safety checking.
For example, in the case of a function that has a buffer on the stack, the function's return address is placed in memory after the buffer.
msdn.microsoft.com /library/en-us/dncode/html/secure05202002.asp   (1767 words)

 What is buffer overflow? - A Word Definition From the Webopedia Computer Dictionary
The condition wherein the data transferred to a buffer exceeds the storage capacity of the buffer and some of the data “overflows” into another buffer, one that the data was not intended to go into.
Since buffers can only hold a specific amount of data, when that capacity has been reached the data has to flow somewhere else, typically into another buffer, which can corrupt data that is already contained in that buffer.
Malicious hackers can launch buffer overflow attacks wherein data with instructions to corrupt a system are purposely written into a file in full knowledge that the data will overflow a buffer and release the instructions into the computer’s instructions.
www.webopedia.com /TERM/b/buffer_overflow.html   (159 words)

 atoms++: atoms::Buffer class Reference
This class is primarily intended for use in the BufferedStreamFilter class.
It is an independent, publically-accessible class to aid unit testing and because in the future, high-performance applications may directly access buffers.
The buffer can be rolled back to this state with a reset.
www.slamb.org /projects/atoms/api/classatoms_1_1Buffer.html   (770 words)

 Buffer Overflows
By far the most common type of buffer overflow attack is based on corrupting the stack.
A stack is a last in first out (LIFO) buffer in the high memory area of a process image.
Neither function guarantees NUL termination if the size of the input buffer is as large as the destination.
www.freebsd.org /doc/en_US.ISO8859-1/books/developers-handbook/secure-bufferov.html   (880 words)

 Alkaline Buffer
Alkaline Buffer™ is a non-phosphate buffer to raise pH and alkalinity (KH) and buffer with Acid Buffer™.
These buffers are designed for the planted aquarium or for very hard water where phosphate buffers may pose an algae or cloudiness problem.
Acid Buffer™ is a phosphate/carbonate free buffer for lowering and stabilizing pH in the acid range of pH 4–6.8.
www.seachem.com /products/product_pages/AlkalineBuffer.html   (277 words)

Park wardens, using their buffer zone management authority, should approach imminent ecosystem damage problems differently than ecosystem restoration problems; they should be prepared to take emergency measures to prevent destruction of an existing ecosystem, while recognizing that ecosystem restoration might take longer to accomplish.
Since buffer zones are designed to address areas of intense conflict on lands adjacent to national park boundaries, it would be helpful if HMG has authority to designate buffer zones inside conservation areas to highlight the need to manage particularly sensitive lands more carefully than other lands located in the conservation area.
Because buffer zone management is linked to local community involvement, villages should generally have the authority to decide for themselves (through their own processes) who should serve on the UGC.
www.mtnforum.org /resources/library/keitr93a.htm   (8544 words)

 Phosphate Buffer Calculation (JavaScript)   (Site not responding. Last check: 2007-11-07)
For example, a pH of about 7.1 with a buffer strength of 10 mM is obtained using 0.082% anhydrous monosodium phosphate and 0.12% trisodium phosphate dodecahydrate.
The buffer may be made by adding 0.082 g anhydrous monosodium phosphate and 0.12 g trisodium phosphate dodecahydrate to 100 ml water.
It's best to buffer at a pH close to one of the pK's, so use this calculation only for phosphate buffers in the pH range of 4.8 to 8.8 and 10.3 to 14.3.
members.nuvox.net /~on.jwclymer/phos.html   (278 words)

 Vertex Buffer Objects (VBOs)
The buffer object ID zero is reserved, and when buffer object zero is bound to a given target, the commands affected by that buffer binding behave normally.
With vertex buffer objects, it is now the job of the GPU to directly interpret the data, whereas the CPU could previously reformat it as needed during submission.
If the data format that is placed in a vertex buffer object cannot be directly handled by the GPU, the implementation may have to read the data back to the CPU for processing, which is often highly inefficient.
www.spec.org /gpc/opc.static/vbo_whitepaper.html   (3229 words)

 Collusion E-zine - simple buffer-overflow exploits   (Site not responding. Last check: 2007-11-07)
A buffer overflow is a condition in a program whereby a function attempts to copy more data into a buffer than it can hold.
In this way, we only need a very rough idea of where the buffer is, so we can get the stack pointer (using the function shown previously) and subtract an offset from it in increments of say 30 or 40 until we hit a NOP somewhere in the buffer.
Here 0-221 works for the offset because the buffer we are overflowing is the very first variable declared in vulnerable.c, so it is right at the beginning of the program's stack.
www.collusion.org /Article.cfm?ID=176   (1551 words)

When accessing the buffer from another thread, you must grab a read lock if you plan on performing more than one call, to ensure that the buffer contents are not changed by the AWT thread for the duration of the lock.
Inserts a string into the buffer, indenting each line of the string to match the indent of the first line.
Note that calling this before a buffer is loaded will have no effect; in that case, set the "mode" property to the name of the mode.
www.jedit.org /42docs/api/org/gjt/sp/jedit/Buffer.html   (2072 words)

 BUFFER INC: Engineering and Consulting   (Site not responding. Last check: 2007-11-07)
Buffer has a talented group of employees and subcontractors that provide a strong technical team for our clients.
Buffer has key personnel and technologies to complete your new product development, as to differentiate your product from your competitors.
Buffer has successfully developed dozens of products for corporations and is often recommended to prospective clients by semiconductor manufacturers.
www.buffer.net   (163 words)

 Hard Disk Cache and Cache Circuitry
The purpose of this cache is not dissimilar to other caches used in the PC, even though it is not normally thought of as part of the regular PC cache hierarchy.
The function of cache is to act as a buffer between a relatively fast device and a relatively slow one.
For hard disks, the cache is used to hold the results of recent reads from the disk, and also to "pre-fetch" information that is likely to be requested in the near future, for example, the sector or sectors immediately after the one just requested.
www.storagereview.com /map/lm.cgi/buffer   (233 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.