Computational fluid dynamics

Overflow (software)

OVERFLOW - the grid FLOW solver - is a software package for simulating fluid flow around solid bodies using computational fluid dynamics (CFD). It is a compressible 3-D flow solver that solves the time-dependent, Reynolds-averaged, Navier–Stokes equations using multiple overset structured grids. (Wikipedia).

Overflow (software)
Video thumbnail

IDEspinner Buffer Overflows pt1

This movie tries to show how you can create a bufferoverflow Credits go out to IDEspinner

From playlist Buffer overflow

Video thumbnail

Bufferoverflow part 3 - exploit coding for a commandline attack vector 1/2

Credits go out to IDEspinner, checkout his website: http://www.crackingislife.com/ clip 1/2

From playlist Buffer overflow

Video thumbnail

Bufferoverflow part 3 - exploit coding for a commandline attack vector 2/2

Credits go out to IDEspinner, checkout his website: http://www.crackingislife.com/ clip 2/2

From playlist Buffer overflow

Video thumbnail

Tutorial: GeoHTTP Remote Buffer Overflow and DoS

A real example of a Buffer Overflow/Denial of Service attack! My favorite video: http://www.youtube.com/watch?v=z00kuZIVXlU Visit http://binslashshell.wordpress.com and join our forum community!!! This is a video showing what a Buffer Overflow Aattck can do to a Web Server. For th

From playlist Denial of Service attacks

Video thumbnail

Object Oriented Programming 5 – Method Overloading (Part 1)

This is the fifth in a series of videos which introduce object oriented programming (OOP) using Visual Basic.NET (VB.NET). This video demonstrates method overloading. A method can have multiple variations, each with the same name, but with a different set of parameters. Each variation o

From playlist Object Oriented Programming

Video thumbnail

Bufferoverflow part 2- machine shellcoding 1/2

Credits go out to IDEspinner, checkout his website: http://www.crackingislife.com/ clip 1/2

From playlist Buffer overflow

Video thumbnail

Exploiting IE XML buffer overflow

Credits go out to the makers of Fast-Track See the webpage at: http://www.thepentest.com/

From playlist Fast-Track

Video thumbnail

Bufferoverflow part 2- machine shellcoding 2/2

Credits go out to IDEspinner, checkout his website: http://www.crackingislife.com/ clip 2/2

From playlist Buffer overflow

Video thumbnail

22C3: Autodafé: An Act of Software Torture

Speaker: Martin Vuagnoux Presentation of an innovative buffer overflow uncovering technique called "Fuzzing by weighting attacks with markers" Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching

From playlist 22C3: Private Investigations

Video thumbnail

Rasa Reading Group: Challenges in Chatbot Development:A Study of Stack Overflow Posts

This week we'll be reading "Challenges in Chatbot Development: A Study of Stack Overflow Posts" by Ahmad Abdellatif, Diego Costa, Khaled Badran, Rabe Abdalkareem and Emad Shihab which was published at MSR '20: Proceedings of the 17th International Conference on Mining Software Repositories

From playlist Rasa Reading Group

Video thumbnail

IU PTI Seminar: Software assurance at IU: A journey into the SWAMP

Rob Quick, UITS Research Technologies' Manager of High Throughput Computing presented on March 1, 2017. The Software Assurance Marketplace (SWAMP) is an open source service that provides access to an array of software analysis tools. The SWAMP also includes a (growing) library of open-sou

From playlist Seminars/Workshops

Video thumbnail

CERIAS Security: Static source code analysis 1/6

Clip 1/6 Speaker: Jacob West · Fortify Software Creating secure code requires more than just good intentions. Programmers need to know how to make their code safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review t

From playlist The CERIAS Security Seminars 2008

Video thumbnail

27c3: I Control Your Code (en)

Speaker: Mathias Payer Attack Vectors Through the Eyes of Software-based Fault Isolation Unsafe languages and an arms race for new bugs calls for an additional line of defense in software systems. User-space virtualization uses dynamic instrumentation to detect different attack vectors a

From playlist 27C3: We come in peace

Video thumbnail

30C3: Bug class genocide (EN)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: Andreas Bogk Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk presents the state of the art in compiler instrume

From playlist 30C3

Video thumbnail

Security Vulnerability Mitigations

Security vulnerabilities allow software to be manipulated in such a way that it misbehaves to the benefit of an attacker - security vulnerability mitigations work to thwart attempts to successfully exploit such a vulnerability. This landscape is continually changing in both the types of at

From playlist Security

Video thumbnail

Buffer Overflows Made Easy - Part 1: Introduction

Write-up: https://tcm-sec.com/2019/05/25/buffer-overflows-made-easy/ This video presents the material that will be covered in my course, Buffer Overflows Made Easy. I also highlight important aspects, such as the anatomy of memory and the anatomy of the stack. In future course videos, w

From playlist Buffer Overflows Made Easy

Video thumbnail

CERIAS Security: Toward Self-healing Software 5/6

Clip 5/6 Speaker: Dr. Angelos D. Keromytis · Columbia As systems grow in size and complexity, our ability to protect them through manual intervention or static defenses degrades. We believe that, in addition to proper design principles and proactive mechanisms, automated reactive appr

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

Object Oriented Programming 6 – Method Overloading (Part 2)

This is the sixth in a series of videos which introduce object oriented programming (OOP) using Visual Basic.NET (VB.NET). This video demonstrates how to write a method overload that will save the property values of an object into a database, thereby saving the object’s state. The method

From playlist Object Oriented Programming

Video thumbnail

OWASP FROC 2010: Watching Software Run Beyond Defect Elimination 2/4

Clip 2/4 Speaker: Brian Chess, Ph.D. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting netw

From playlist OWASP FROC 2010

Related pages

Navier–Stokes equations | Computational fluid dynamics