Tux-UKUUG logo
Linux 2005
Conference and Tutorials
---------------------------------------------------
Thursday 4th to Sunday 7th August
University of Wales, Swansea

Linux 2005

Programme

Tutorials

About Swansea

Timetable

Registration

Directions

Accommodation

CACert Assurance

Thursday Evening

Conference Dinner

Exhibition

Call For Papers

Other UKUUG events

Tom Cosgrove

Exploit Mitigation Techniques

Even after huge efforts to increase software quality, bugs will remain. The clever attacker understands the unintended side-effects created by a bug, as well as the system environment the code executes in, and crafts an exploit which grants him advantage. It is high time for defensive technologies that make it harder to write exploits. Recent and upcoming developments make the environment in which UNIX processes live much more hostile towards exploitation, without impacting well-behaving processes.


S  P O N S O R S
Red Hat
Red Hat
ITWales
ITWales
Astaro Internet Security
Astaro Internet Security
PepLink
PePLink

M  E D I A   S  P O N S O R S
Linux Magazine
Linux Magazine
ITWales
ITWales
Linux User
Linux User & Developer
Ping Wales
Ping Wales
Need To Know
NTK
The Register
The Register

For more information please contact UKUUG Problems? e-mail webmaster
© Copyright 2005 UKUUG Ltd