The December Storm of WMF: Preparation, Identification, and Containment of Exploits

So, what can be done about vulnerabilities like WMF and their exploits? Ultimately, it will take a combination of good coding practices and automatic defenses to bring what seems to be the explosive spread of malware under control. Like other ills, floods, tornadoes, scam artists, and economic...
By
James Voorhees
November 17, 2006

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg