[ Thanks to Sham for this link.
“In our last article, we saw objectives of computer security and
had a brief introduction on secure programming. We also delved
deeply into the need of secure programming, what type of programs
need secure programming and why programmers write insecure
“Continuing with our two part series, we’ll look into an
extremely common security flaw–Buffer Overflow–in this