منابع مشابه
Numeric ActiveX components
This paper is concerned with the use of ActiveX components for numerical computations from within the Microsoft Windows environment. Detailed information is provided concerning the use of these components from Microsoft Excel, Microsoft Visual Basic, Microsoft Web browsers and Inprise Delphi. The examples in the paper are based on the following ActiveX components: a fast Fourier transform Activ...
متن کاملNumeric Windows Components
One approach is to provide Dynamic Link Libraries (DLLs) which allow Mathematical software to be used from within Excel, Visual Basic, Visual C++, Visual Fortran etc. However, to call a DLL routine directly from Visual Basic requires detailed knowledge of both the routine’s arguments and also the manner in which they are passed to the Visual Basic calling program. It is therefore essential that...
متن کاملVulnerability Detection in ActiveX Controls
Vulnerabilities in ActiveX controls are frequently used by attackers to compromise systems using the Microsoft Internet Explorer web browser. A programming or design flaw in an ActiveX control can allow arbitrary code execution as the result of viewing a specially-crafted web page. In this paper, we examine effective techniques for fuzz testing ActiveX controls, using the Dranzer tool developed...
متن کاملMontage - an ActiveX Container for Dynamic Interfaces
Montage is a customizable, embeddable ActiveX container. Its client objects may be positioned dynamically by an external layout agent. Montage manages toolbars and user interface modes, integrating disparate components into a single, consistent interface. An important part of this task is supporting “group repositories” of related objects for data transfer operations such as cut-and-paste, drag...
متن کاملPost-Exploitation on Windows using ActiveX Controls
When exploiting software vulnerabilities it is sometimes impossible to build direct communication channels between a target machine and an attacker’s machine due to restrictive outbound filters that may be in place on the target machine’s network. Bypassing these filters involves creating a postexploitation payload that is capable of masquerading as normal user traffic from within the context o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software: Practice and Experience
سال: 2001
ISSN: 0038-0644,1097-024X
DOI: 10.1002/1097-024x(200102)31:2<147::aid-spe360>3.0.co;2-v