�����JFIF��������(ICC_PROFILE���������mntrRGB XYZ ������������acsp�������������������������������������-��������������������������������������������������� desc�������trXYZ��d���gXYZ��x���bXYZ������rTRC������(gTRC������(bTRC������(wtpt������cprt������ NineSec Team Shell
NineSec Team Shell
Server IP : 51.38.211.120  /  Your IP : 216.73.216.171
Web Server : Apache
System : Linux bob 6.17.4-2-pve #1 SMP PREEMPT_DYNAMIC PMX 6.17.4-2 (2025-12-19T07:49Z) x86_64
User : readytorun ( 1067)
PHP Version : 8.0.30
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF
Directory (0755) :  /media/../usr/share/javascript/../doc/nodejs/../cpp/../cpp/../cpp/../ssh/../cpp-9/

[  Home  ][  C0mmand  ][  Upload File  ][  Lock Shell  ][  Logout  ]

Current File : //media/../usr/share/javascript/../doc/nodejs/../cpp/../cpp/../cpp/../ssh/../cpp-9/README.ssp
Stack smashing protection is a feature of GCC that enables a program to
detect buffer overflows and immediately terminate execution, rather than
continuing execution with corrupt internal data structures. It uses
"canaries" and local variable reordering to reduce the likelihood of
stack corruption through buffer overflows.

Options that affect stack smashing protection:

-fstack-protector
    Enables protection for functions that are vulnerable to stack
    smashing, such as those that call alloca() or use pointers.

-fstack-protector-all
    Enables protection for all functions.

-Wstack-protector
    Warns about functions that will not be protected. Only active when
    -fstack-protector has been used.

Applications built with stack smashing protection should link with the
ssp library by using the option "-lssp" for systems with glibc-2.3.x or
older; glibc-2.4 and newer versions provide this functionality in libc.

The Debian architectures alpha, hppa, ia64, m68k, mips, mipsel do not
have support for stack smashing protection.

More documentation can be found at the project's website:
http://researchweb.watson.ibm.com/trl/projects/security/ssp/

NineSec Team - 2022
Name
Size
Last Modified
Owner
Permissions
Options
..
--
April 08 2025 12:08:09
root
0755
C++
--
October 23 2023 6:29:27
root
0755
gcc
--
October 23 2023 6:29:26
root
0755
gomp
--
October 23 2023 6:29:26
root
0755
itm
--
October 23 2023 6:29:26
root
0755
quadmath
--
October 23 2023 6:29:26
root
0755
sanitizer
--
October 23 2023 6:29:26
root
0755
NEWS.gz
14.817 KB
May 02 2018 11:11:00
root
0644
NEWS.html
63.973 KB
May 02 2018 10:57:06
root
0644
README.Bugs
10.895 KB
October 24 2022 11:28:06
root
0644
README.Debian.amd64.gz
3.615 KB
October 24 2022 11:28:06
root
0644
README.ssp
1.138 KB
February 25 2015 9:21:00
root
0644
TODO.Debian
1.614 KB
November 10 2016 2:42:59
root
0644
changelog.Debian.gz
1.075 KB
October 24 2022 11:28:06
root
0644
changelog.gz
157.282 KB
June 01 2021 9:53:23
root
0644
copyright
73.521 KB
October 24 2022 11:28:06
root
0644

NineSec Team - 2022