1 minute read

2.3.1 ● Types of buffer-overflow attacks

A Handbook on DIY Electronic Security and Espionage trench warfare 42, 90 TRF 19 triangulation 19, 210

TRNG 78, 79, 81, 82, 83, 84, 86, 87, 88, 93, 124, 126, 198, 200, 201, 202, 210, 217 true random 13, 19, 36, 54, 78, 83, 106 tuned radio frequency receiver 19 turntable 182 typebar 40 typewriter 26, 40, 42, 116, 200

U

UART 112, 116, 121, 128, 137, 155, 158, 159, 160, 161, 162, 164, 165, 166, 168, 194, 198, 210 UHF 44, 45, 46, 47, 121, 131, 158, 188, 218 UNO R4 112, 114, 115

V

vacuum tube 42, 44, 48, 56 van Eck 12, 44, 46, 47, 52, 99, 157, 188, 216 VENONA 91, 92, 99 Vernam 15, 33, 112 VHDL 57 Vigenere 15 VOIP 17, 75, 187 Voja Antonić 131 von Neumann 39, 40, 67, 135, 137, 150, 158

W

warez 109 Warsaw Pact 15, 22, 23, 111 watchdog 138, 158 wavelength 41, 43, 45, 48, 158, 189

WDT 40, 138, 158, 159, 211 wear-levelling 62 Wichmann-Hill generator 83 WinHex 80 WinZip 80, 81 write amplification 28

X

XOR 15, 88, 92, 108, 109, 126, 146, 205, 206, 207

Y

Y2k 190

This article is from: