Quote:
Originally Posted by knc1
Well, Phooey! That picture came out way too small...
The actual error message is:

|
@knc1, Does it mean that it can be exploited? I'm pretty new to this could you "unpack" it a bit?
The most closest I found is
this "buffer overflow" chapter from "Computer Security: A Hands-on Approach"