> I'm reading more papers about "how generate exploits", but where I can find > good information about buffer overflow, smashing the stack, etc.
I just recently found a good example, which is actually going into the details; http://www.radsoft.net/security/mudge.html You will find some more on this topic, browsing that well-worthy website. - Jonas Nagel -- Security <[EMAIL PROTECTED]>