Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Fun Animation about "Use After Free" Vulnerability

Computer Security computer exploit programming hacking memory pointers buffer exploit animation funny cartoon computer science how do exploits work

  • Please log in to reply

#1
Thingy1972

Thingy1972

    New Member

  • Member
  • Pip
  • 1 posts

Hello,

 

I thought as fellow geeks that you might enjoy this animation I produced about a type of computer programming vulnerability called "Use-After Free" - its hosted on youtube and is designed to be fun and friendly so that anybody and everybody can understand it.

 


  • 0

Advertisements







Similar Topics


Also tagged with one or more of these keywords: Computer Security, computer exploit, programming, hacking, memory pointers, buffer exploit, animation, funny cartoon, computer science, how do exploits work

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP