Exploit Development Research on x86 Windows Application: Buffer Overflow
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Assessment Of Global Rice Production And Export Opportunity For Economic Development In Ethiopia
The study was conducted on the assessment of global rice production and its export opportunity for economic development. Ethiopia is a versatile country and gate way to many African countries. The country is well known f...
A Control Scheme of Cascaded Multilevel Inverter Based D-STATCOM for Improving the Voltage Control and Reduce Total Harmonics Distortion
This paper presents an investigation of Nine -Level Cascaded H - bridge (CHB) Inverter as Distribution Static Compensator (DSTATCOM) in Power System (PS) for compensation of reactive power and harmonics. The advantages o...
Virulence and Control of Sporisorium ehrenbergii Vánky Races Attack Sorghum in Sohag Regions of Upper Egypt
Sporisorium ehrenbergii Vánky is the causal agent of long smut (LS) on sorghum in several African and Asian countries. For effective breeding programs to evolve LS resistant varieties to control this important disease, i...
Design of a Cleaner Production Framework to Enhance Productivity: Case Study of Leather Company
Design of a Cleaner Production Framework to Enhance Productivity: Case Study of Leather Company
Detection of Cysts in Ultrasonic Images of Ovary
In this paper, cysts are detected in the ultrasonic images of ovary. PCOS is an endocrine disorder affecting women of reproductive age. This syndrome is mainly seen in women whose age is in between 25 and 35. We are prop...