tag:blogger.com,1999:blog-4088979.post113537429538380820..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Pre-Review: Writing Security Tools and ExploitsRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-1135817898238121762005-12-28T19:58:00.000-05:002005-12-28T19:58:00.000-05:00This scenario looks just like modern day movies, n...This scenario looks just like modern day movies, no originality. Everyone just keeps doing remakes (or reprints in this case) of old stuff.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1135433437632682312005-12-24T09:10:00.000-05:002005-12-24T09:10:00.000-05:00Two other Syngress titles suffer from the same pro...Two other Syngress titles suffer from the same problem:<BR/>Buffer overflow attacks<BR/>sockets, shellcode, porting & coding<BR/><BR/>Two chapters on shellcode are exactly the same in these two books. The exploit case studies from Buffer overflow attacks are also repeated in the other book.Anonymousnoreply@blogger.com