Pages

Sunday, January 29, 2017

Improving Photo Search A Step Across the Semantic Gap

Posted by Chuck Rosenberg, Image Search TeamLast month at Google I/O, we showed a major upgrade to the photos experience: you can now easily search your...
Read More..

Computer respond to this email

Posted by Greg Corrado*, Senior Research ScientistMachine Intelligence for YouWhat I love about working at Google is the opportunity to harness cutting-edge...
Read More..

More Literacy Activities

ohttp://pbskids.org/games/literacy.html When you finish one game, use the back button to return to the games pa...
Read More..

Saturday, January 28, 2017

Computer sound card drivers Downloads

cvcvCompanyDriverspageAcerAcer sound card driversAd-ChipsAd-Chips sound card driversAddonicsAddonics sound card driversAnalogDevicesAnalog sound card...
Read More..

Math Activities

http://pbskids.org/games/math.h...
Read More..

Autonomously Estimating Attractiveness using Computer Vision

How do you go about teaching a computer what is attractive and what is not?This is a very difficult question I have been thinking about recently.Do you...
Read More..

Friday, January 27, 2017

Announcing the Google MOOC Focused Research Awards

Posted by Maggie Johnson, Director of Education and University Relations, and Aimin Zhu, University Relations Manager, APACLast year, Google and Tsinghua...
Read More..

Wednesday, January 25, 2017

You can change your Windows Password if forget the current password

1st step: go to run then type this code lusrmgr.msc and then enter.2nd step: open a new window then click users folder 3rd step: The...
Read More..

The worlds largest photo service just made its pictures free to use

Getty Images is the worlds largest image database with millions of images, all watermarked. These represent over a hundred years of photography,...
Read More..

Monday, January 23, 2017

Should My Kid Learn to Code

Posted by Maggie Johnson, Director of Education and University Relations, Google(Cross-posted on the Google for Education Blog)Over the last few years,...
Read More..

Sunday, January 22, 2017

How to determine how many cameras are connected to a computer and connect to and use ptz cameras

How to determine how many cameras are connected to a computer and connect to and use ptz cameras:I figure this is a nice easy first post. This is some...
Read More..

How to Implement Buffer Overflow


Buffer overflow exploits are commonly found problems which can cause irrevocable damage to a system if taken advantage of. The only way to prevent them is to be careful about coding practices and bounds check to make sure no kind of input, stream, file, command, encryption key, or otherwise can be used to overwrite a buffer past bounds. The problem with this is that many libraries, programs, and operating systems used by programmers already have many of these exploits in them, making prevention difficult if not impossible.

That being said, here is kind of how it works (all examples run in Windows XP using gdb):
The files used for exploit are named vulnerable_code (courtesy of Dr. Richard Brooks from Clemson University) and they can be found here: 
http://code.google.com/p/stevenhickson-code/source/browse/#svn%2Ftrunk%2FBufferOverflow

(All code is licensed under the GPL modified license included at the google-code address. It is simply the GPL v3.0 with the modifier that if you enjoyed this and run into me somewhere sometime, you are welcome to buy me a drink).

The link above also includes all the assembly files used to create shellcode, nasm to assemble it, and arwin to find the memory locations. It should have everything you need.

Note: Bear in mind that the memory locations will probably be different for you and you will have to find them yourself (probably by writing AAAA over and over again in memory).

IMPORTANT:
This tutorial is used for explanation and education only. Do not copy my examples and turn them in for a class. You will get caught and get in trouble and you wont learn anything and I will program a helicopter to hunt you down autonomously as revenge.