All public logs

Combined display of all available logs of Restarters Wiki. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).

Logs
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)
  • 09:35, 1 October 2024 Philip talk contribs created page Glossary:Buffer overflow vulnerability (Created page with "A buffer overflow happens when a program is given more data (whether direct user input or from a network source) than will fit in the memory space that has been allocated for it. The extra may then overwrite nearby data causing unexpected behaviour, which may include an attacker being able to take over control of the program. Buffer overflows can be avoided by strict adherence to a cardinal rule of secure coding: thoroughly validate all input from potentially untrusted s...")
  • 16:27, 30 September 2024 Philip talk contribs created page Glossary:Memory leak (Created page with "Sophisticated software such as a browser performs much of its work using small chunks of memory for temporary storage, borrowed from a pool. Sometimes, due to a bug, it may fail to return it to the pool when it's finished with it. This is known as a memory leak, and can result in the memory pool becoming depleted to the extent that the software can no longer operate. The only solution is to close and relaunch it.")
  • 15:56, 23 September 2024 Philip talk contribs created page Glossary:Supply chain attack (Created page with "Modern hardware and software is generally composed of many different (hardware and software) components, some of these themselves composed of multiple sub-components. Keeping track of the provenance and trustworthiness of all of these can be an extremely difficult problem. Any of them might be compromised in a "supply chain" attack to compromise the integrity of a finished product. A classic example was the introduction of explosives into pagers and walkie-talkies suppli...")
  • 15:41, 23 September 2024 Philip talk contribs moved page Watering hole attack to Glossary:Watering hole attack without leaving a redirect
  • 14:00, 23 September 2024 Philip talk contribs created page Watering hole attack (Created page with "A watering hole attack is an attempt to compromise a target organisation or individual by first compromising a website or online resource that they are known or suspected to use (their "watering hole"). In this way, for example, the attacker may hope to gain access to a well defended defence contractor though one of its less secure suppliers.")
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)