THE HACKER'S HANDBOOK

This increases the probability that hackers will be able to locate buffer addresses of targeted programs. One of the most effective and easily implemented defenses to protect against buffer overflow attacks works by making it more difficult for hackers to locate the buffer address. ................
................