“Software security is a major concern for the high-tech industry, and the most feared and misunderstood software vulnerability is the buffer overrun. Today, the mention of a buffer overrun is enough to make people stop and listen. All too often, the technical details get lost in the transcription, and the general public comes away with a rather alarming view of a rather fundamental problem. To address this problem, Visual (unmanaged) C++ .NET introduces security checks to assist developers in identifying buffer overruns.” Read the rest of the article at MSDN.
Hmm i wonder where this idea comes from! Didn’t it came from Opensource community? Anywayz they implented a wrong version of it, this one contains a bug, which makes it very vernaible … So not very wise to use it.
This is what type safety in a programming language is for. These problems have been addressed years ago by theoreticians. The result? Type-safety! Java! Modula3!