,----[ Quote ]
| To test her concept, Forrest experimented with a version of the
| open-source operating system Linux. She altered the system to force
| programs to assign data to memory locations at random. Then she subjected
| the computer to several well-known attacks that used the buffer-overflow
| technique. None could get through. Instead, they targeted the wrong area
| of memory. Although part of the software would often crash, Linux would
| quickly restart it, and get rid of the virus in the process.
`----
http://www.schneier.com/blog/archives/2006/08/security_and_mo.html
|
|