Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Buffer overflow

+ Save concept

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. [1]

115 relations: Ada (programming language), Address space layout randomization, Alphanumeric, Alphanumeric shellcode, Array data structure, ASCII, Billion laughs attack, Bounds checking, Buffer over-read, Buffer overflow protection, Bugtraq, C (programming language), C dynamic memory allocation, C file input/output, C standard library, C string handling, C++, Call stack, Code Red (computer worm), Computer architecture, Computer data storage, Computer program, Computer programming, Computer security, Computer worm, Crash (computing), Cyclone (programming language), D (programming language), Daemon (computing), Data, Data (computing), Data buffer, Eiffel (programming language), Elias Levy, Empty string, End-of-file, Endianness, Exception handling, Exec Shield, Executable space protection, Execution (computing), Exploit (computer security), Finger protocol, Forth (programming language), Fuzzing, GNU Compiler Collection, Graphics Device Interface, Heap overflow, Heuristic (computer science), Homebrew (video games), ..., Information security, Internet Information Services, Interpreted language, Intrusion detection system, Java (software platform), JPEG, Legacy code, Lisp (programming language), MacOS, Memory address, Memory management, Metacharacter, Metamorphic code, Metasploit Project, Microsoft, Microsoft SQL Server, Microsoft Windows, Microsoft-specific exception handling mechanisms, Modchip, Modula-2, Morris worm, NOP, Null-terminated string, NX bit, OCaml, Opcode, OpenBSD, Openwall Project, Operating system, Paging, PaX, Payload (computing), Phrack, Ping of death, PlayStation 2, Polymorphic code, Port scanner, Privilege escalation, Programming language, Proprietary software, Rebasing, Return-to-libc attack, Rust (programming language), Scanf format string, Security-focused operating system, Segmentation fault, Self-modifying code, Shellcode, Smalltalk, Software bug, SQL Slammer, Stack buffer overflow, Standard Template Library, Static program analysis, System administrator, The Legend of Zelda: Twilight Princess, Uncontrolled format string, Unicode, Unix, Virtual memory, Wii, W^X, Xbox (console), .NET Framework, 64-bit computing. Expand index (65 more) »

Ada (programming language)

Ada is a structured, statically typed, imperative, and object-oriented high-level computer programming language, extended from Pascal and other languages.

New!!: Buffer overflow and Ada (programming language) · See more »

Address space layout randomization

Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

New!!: Buffer overflow and Address space layout randomization · See more »

Alphanumeric

Alphanumeric is a combination of alphabetic and numeric characters, and is used to describe the collection of Latin letters and Arabic digits or a text constructed from this collection.

New!!: Buffer overflow and Alphanumeric · See more »

Alphanumeric shellcode

In computer security alphanumeric shellcode is a shellcode that consists of or assembles itself on execution into entirely alphanumeric ASCII or Unicode characters such as 0-9, A-Z and a-z. This type of encoding was created by hackers to hide working machine code inside what appears to be text.

New!!: Buffer overflow and Alphanumeric shellcode · See more »

Array data structure

In computer science, an array data structure, or simply an array, is a data structure consisting of a collection of elements (values or variables), each identified by at least one array index or key.

New!!: Buffer overflow and Array data structure · See more »

ASCII

ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

New!!: Buffer overflow and ASCII · See more »

Billion laughs attack

In computer security, a billion laughs attack is a type of denial-of-service (DoS) attack which is aimed at parsers of XML documents.

New!!: Buffer overflow and Billion laughs attack · See more »

Bounds checking

In computer programming, bounds checking is any method of detecting whether a variable is within some bounds before it is used.

New!!: Buffer overflow and Bounds checking · See more »

Buffer over-read

In computer security and programming, a buffer over-read is an anomaly where a program, while reading data from a buffer, overruns the buffer's boundary and reads (or tries to read) adjacent memory.

New!!: Buffer overflow and Buffer over-read · See more »

Buffer overflow protection

Buffer overflow protection is any of various techniques used during software development to enhance the security of executable programs by detecting buffer overflows on stack-allocated variables, and preventing them from causing program misbehavior or from becoming serious security vulnerabilities.

New!!: Buffer overflow and Buffer overflow protection · See more »

Bugtraq

Bugtraq is an electronic mailing list dedicated to issues about computer security.

New!!: Buffer overflow and Bugtraq · See more »

C (programming language)

C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.

New!!: Buffer overflow and C (programming language) · See more »

C dynamic memory allocation

C dynamic memory allocation refers to performing manual memory management for dynamic memory allocation in the C programming language via a group of functions in the C standard library, namely,, and.

New!!: Buffer overflow and C dynamic memory allocation · See more »

C file input/output

The C programming language provides many standard library functions for file input and output.

New!!: Buffer overflow and C file input/output · See more »

C standard library

The C standard library or libc is the standard library for the C programming language, as specified in the ANSI C standard.

New!!: Buffer overflow and C standard library · See more »

C string handling

The C programming language has a set of functions implementing operations on strings (character strings and byte strings) in its standard library.

New!!: Buffer overflow and C string handling · See more »

C++

C++ ("see plus plus") is a general-purpose programming language.

New!!: Buffer overflow and C++ · See more »

Call stack

In computer science, a call stack is a stack data structure that stores information about the active subroutines of a computer program.

New!!: Buffer overflow and Call stack · See more »

Code Red (computer worm)

Code Red was a computer worm observed on the Internet on July 15, 2001.

New!!: Buffer overflow and Code Red (computer worm) · See more »

Computer architecture

In computer engineering, computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems.

New!!: Buffer overflow and Computer architecture · See more »

Computer data storage

Computer data storage, often called storage or memory, is a technology consisting of computer components and recording media that are used to retain digital data.

New!!: Buffer overflow and Computer data storage · See more »

Computer program

A computer program is a collection of instructions for performing a specific task that is designed to solve a specific class of problems.

New!!: Buffer overflow and Computer program · See more »

Computer programming

Computer programming is the process of building and designing an executable computer program for accomplishing a specific computing task.

New!!: Buffer overflow and Computer programming · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Buffer overflow and Computer security · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Buffer overflow and Computer worm · See more »

Crash (computing)

In computing, a crash (or system crash) occurs when a computer program, such as a software application or an operating system, stops functioning properly and exits.

New!!: Buffer overflow and Crash (computing) · See more »

Cyclone (programming language)

The Cyclone programming language is intended to be a safe dialect of the C language.

New!!: Buffer overflow and Cyclone (programming language) · See more »

D (programming language)

D is an object-oriented, imperative, multi-paradigm system programming language created by Walter Bright of Digital Mars and released in 2001.

New!!: Buffer overflow and D (programming language) · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Buffer overflow and Daemon (computing) · See more »

Data

Data is a set of values of qualitative or quantitative variables.

New!!: Buffer overflow and Data · See more »

Data (computing)

Data (treated as singular, plural, or as a mass noun) is any sequence of one or more symbols given meaning by specific act(s) of interpretation.

New!!: Buffer overflow and Data (computing) · See more »

Data buffer

In computer science, a data buffer (or just buffer) is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another.

New!!: Buffer overflow and Data buffer · See more »

Eiffel (programming language)

Eiffel is an object-oriented programming language designed by Bertrand Meyer (an object-orientation proponent and author of Object-Oriented Software Construction) and Eiffel Software.

New!!: Buffer overflow and Eiffel (programming language) · See more »

Elias Levy

Elias Levy (also known as Aleph One) was the moderator of "Bugtraq", a full disclosure vulnerability mailing list, from May 14, 1996 until October 15, 2001.

New!!: Buffer overflow and Elias Levy · See more »

Empty string

In formal language theory, the empty string, or empty word is the unique string of length zero.

New!!: Buffer overflow and Empty string · See more »

End-of-file

In computing, end-of-file (commonly abbreviated EOF) is a condition in a computer operating system where no more data can be read from a data source.

New!!: Buffer overflow and End-of-file · See more »

Endianness

Endianness refers to the sequential order in which bytes are arranged into larger numerical values when stored in memory or when transmitted over digital links.

New!!: Buffer overflow and Endianness · See more »

Exception handling

Exception handling is the process of responding to the occurrence, during computation, of exceptions – anomalous or exceptional conditions requiring special processing – often changing the normal flow of program execution.

New!!: Buffer overflow and Exception handling · See more »

Exec Shield

Exec Shield is a project started at Red Hat, Inc in late 2002 with the aim of reducing the risk of worm or other automated remote attacks on Linux systems.

New!!: Buffer overflow and Exec Shield · See more »

Executable space protection

In computer security, executable-space protection marks memory regions as non-executable, such that an attempt to execute machine code in these regions will cause an exception.

New!!: Buffer overflow and Executable space protection · See more »

Execution (computing)

Execution in computer and software engineering is the process by which a computer or a virtual machine performs the instructions of a computer program.

New!!: Buffer overflow and Execution (computing) · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Buffer overflow and Exploit (computer security) · See more »

Finger protocol

In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.

New!!: Buffer overflow and Finger protocol · See more »

Forth (programming language)

Forth is an imperative stack-based computer programming language and environment originally designed by Charles "Chuck" Moore.

New!!: Buffer overflow and Forth (programming language) · See more »

Fuzzing

Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.

New!!: Buffer overflow and Fuzzing · See more »

GNU Compiler Collection

The GNU Compiler Collection (GCC) is a compiler system produced by the GNU Project supporting various programming languages.

New!!: Buffer overflow and GNU Compiler Collection · See more »

Graphics Device Interface

The Graphics Device Interface (GDI) is a Microsoft Windows application programming interface and core operating system component responsible for representing graphical objects and transmitting them to output devices such as monitors and printers.

New!!: Buffer overflow and Graphics Device Interface · See more »

Heap overflow

A heap overflow or heap overrun is a type of buffer overflow that occurs in the heap data area.

New!!: Buffer overflow and Heap overflow · See more »

Heuristic (computer science)

In computer science, artificial intelligence, and mathematical optimization, a heuristic (from Greek εὑρίσκω "I find, discover") is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.

New!!: Buffer overflow and Heuristic (computer science) · See more »

Homebrew (video games)

Homebrew is a term frequently applied to video games or other software produced by consumers to target proprietary hardware platforms (usually with hardware restrictions) not typically user-programmable or that use proprietary storage methods.

New!!: Buffer overflow and Homebrew (video games) · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Buffer overflow and Information security · See more »

Internet Information Services

Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with the Windows NT family.

New!!: Buffer overflow and Internet Information Services · See more »

Interpreted language

An interpreted language is a type of programming language for which most of its implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions.

New!!: Buffer overflow and Interpreted language · See more »

Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

New!!: Buffer overflow and Intrusion detection system · See more »

Java (software platform)

Java is a set of computer software and specifications developed by James Gosling at Sun Microsystems, which was later acquired by the Oracle Corporation, that provides a system for developing application software and deploying it in a cross-platform computing environment.

New!!: Buffer overflow and Java (software platform) · See more »

JPEG

JPEG is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.

New!!: Buffer overflow and JPEG · See more »

Legacy code

Legacy code is source code that relates to a no-longer supported or manufactured operating system or other computer technology.

New!!: Buffer overflow and Legacy code · See more »

Lisp (programming language)

Lisp (historically, LISP) is a family of computer programming languages with a long history and a distinctive, fully parenthesized prefix notation.

New!!: Buffer overflow and Lisp (programming language) · See more »

MacOS

macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: Buffer overflow and MacOS · See more »

Memory address

In computing, a memory address is a reference to a specific memory location used at various levels by software and hardware.

New!!: Buffer overflow and Memory address · See more »

Memory management

Memory management is a form of resource management applied to computer memory.

New!!: Buffer overflow and Memory management · See more »

Metacharacter

A metacharacter is a character that has a special meaning (instead of a literal meaning) to a computer program, such as a shell interpreter or a regular expression (regex) engine.

New!!: Buffer overflow and Metacharacter · See more »

Metamorphic code

Metamorphic code is code that when run outputs a logically equivalent version of its own code under some interpretation.

New!!: Buffer overflow and Metamorphic code · See more »

Metasploit Project

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

New!!: Buffer overflow and Metasploit Project · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Buffer overflow and Microsoft · See more »

Microsoft SQL Server

Microsoft SQL Server is a relational database management system developed by Microsoft.

New!!: Buffer overflow and Microsoft SQL Server · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Buffer overflow and Microsoft Windows · See more »

Microsoft-specific exception handling mechanisms

Microsoft Windows OS family employs some exception handling mechanisms that are based on the operating system specifics.

New!!: Buffer overflow and Microsoft-specific exception handling mechanisms · See more »

Modchip

A modchip (short for modification chip) is a small electronic device used to alter or disable artificial restrictions of computers or entertainment devices.

New!!: Buffer overflow and Modchip · See more »

Modula-2

Modula-2 is a computer programming language designed and developed between 1977 and 1985 by Niklaus Wirth at the Swiss Federal Institute of Technology in Zurich (ETH Zurich) as a revision of Pascal to serve as the sole programming language for the operating system and application software for the personal workstation Lilith.

New!!: Buffer overflow and Modula-2 · See more »

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet.

New!!: Buffer overflow and Morris worm · See more »

NOP

In computer science, a NOP, no-op, or NOOP (pronounced "no op"; short for no operation) is an assembly language instruction, programming language statement, or computer protocol command that does nothing.

New!!: Buffer overflow and NOP · See more »

Null-terminated string

In computer programming, a null-terminated string is a character string stored as an array containing the characters and terminated with a null character ('\0', called NUL in ASCII).

New!!: Buffer overflow and Null-terminated string · See more »

NX bit

The NX bit (no-execute) is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a feature normally only found in Harvard architecture processors.

New!!: Buffer overflow and NX bit · See more »

OCaml

OCaml, originally named Objective Caml, is the main implementation of the programming language Caml, created by Xavier Leroy, Jérôme Vouillon, Damien Doligez, Didier Rémy, Ascánder Suárez and others in 1996.

New!!: Buffer overflow and OCaml · See more »

Opcode

In computing, an opcode (abbreviated from operation code, also known as instruction syllable, instruction parcel or opstring) is the portion of a machine language instruction that specifies the operation to be performed.

New!!: Buffer overflow and Opcode · See more »

OpenBSD

OpenBSD is a free and open-source Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Buffer overflow and OpenBSD · See more »

Openwall Project

The Openwall Project is a source for various software, including Openwall GNU/*/Linux (Owl), a security-enhanced operating system designed for servers.

New!!: Buffer overflow and Openwall Project · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Buffer overflow and Operating system · See more »

Paging

In computer operating systems, paging is a memory management scheme by which a computer stores and retrieves data from secondary storage for use in main memory.

New!!: Buffer overflow and Paging · See more »

PaX

PaX is a patch for the Linux kernel that implements least privilege protections for memory pages.

New!!: Buffer overflow and PaX · See more »

Payload (computing)

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message.

New!!: Buffer overflow and Payload (computing) · See more »

Phrack

Phrack is an ezine written by and for hackers, first published November 17, 1985.

New!!: Buffer overflow and Phrack · See more »

Ping of death

A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer.

New!!: Buffer overflow and Ping of death · See more »

PlayStation 2

The PlayStation 2 (PS2) is a home video game console that was developed by Sony Computer Entertainment.

New!!: Buffer overflow and PlayStation 2 · See more »

Polymorphic code

In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact.

New!!: Buffer overflow and Polymorphic code · See more »

Port scanner

A port scanner is an application designed to probe a server or host for open ports.

New!!: Buffer overflow and Port scanner · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: Buffer overflow and Privilege escalation · See more »

Programming language

A programming language is a formal language that specifies a set of instructions that can be used to produce various kinds of output.

New!!: Buffer overflow and Programming language · See more »

Proprietary software

Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

New!!: Buffer overflow and Proprietary software · See more »

Rebasing

In computing, rebasing is one of the following.

New!!: Buffer overflow and Rebasing · See more »

Return-to-libc attack

A "return-to-libc" attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by an address of a subroutine that is already present in the process’ executable memory, bypassing the NX bit feature (if present) and ridding the attacker of the need to inject their own code.

New!!: Buffer overflow and Return-to-libc attack · See more »

Rust (programming language)

Rust is a systems programming language sponsored by Mozilla which describes it as a "safe, concurrent, practical language," supporting functional and imperative-procedural paradigms.

New!!: Buffer overflow and Rust (programming language) · See more »

Scanf format string

Scanf format string (which stands for "scan formatted") refers to a control parameter used by a class of functions in the string-processing libraries of various programming languages.

New!!: Buffer overflow and Scanf format string · See more »

Security-focused operating system

This is a list of operating systems with a sharp security focus.

New!!: Buffer overflow and Security-focused operating system · See more »

Segmentation fault

In computing, a segmentation fault (often shortened to segfault) or access violation is a fault, or failure condition, raised by hardware with memory protection, notifying an operating system (OS) the software has attempted to access a restricted area of memory (a memory access violation).

New!!: Buffer overflow and Segmentation fault · See more »

Self-modifying code

In computer science, self-modifying code is code that alters its own instructions while it is executing – usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simplifying maintenance.

New!!: Buffer overflow and Self-modifying code · See more »

Shellcode

In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.

New!!: Buffer overflow and Shellcode · See more »

Smalltalk

Smalltalk is an object-oriented, dynamically typed, reflective programming language.

New!!: Buffer overflow and Smalltalk · See more »

Software bug

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

New!!: Buffer overflow and Software bug · See more »

SQL Slammer

SQL Slammer is a 2003 computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic.

New!!: Buffer overflow and SQL Slammer · See more »

Stack buffer overflow

In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.

New!!: Buffer overflow and Stack buffer overflow · See more »

Standard Template Library

The Standard Template Library (STL) is a software library for the C++ programming language that influenced many parts of the C++ Standard Library.

New!!: Buffer overflow and Standard Template Library · See more »

Static program analysis

Static program analysis is the analysis of computer software that is performed without actually executing programs.

New!!: Buffer overflow and Static program analysis · See more »

System administrator

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.

New!!: Buffer overflow and System administrator · See more »

The Legend of Zelda: Twilight Princess

The Legend of Zelda: Twilight Princess is an action-adventure game developed and published by Nintendo for the Wii and GameCube home video game consoles.

New!!: Buffer overflow and The Legend of Zelda: Twilight Princess · See more »

Uncontrolled format string

Uncontrolled format string is a type of software vulnerability discovered around 1989 that can be used in security exploits.

New!!: Buffer overflow and Uncontrolled format string · See more »

Unicode

Unicode is a computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems.

New!!: Buffer overflow and Unicode · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Buffer overflow and Unix · See more »

Virtual memory

In computing, virtual memory (also virtual storage) is a memory management technique that provides an "idealized abstraction of the storage resources that are actually available on a given machine" which "creates the illusion to users of a very large (main) memory." The computer's operating system, using a combination of hardware and software, maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory.

New!!: Buffer overflow and Virtual memory · See more »

Wii

The Wii is a home video game console released by Nintendo on November 19, 2006.

New!!: Buffer overflow and Wii · See more »

W^X

W^X ("Write XOR Execute"; spoken as W xor X) is a security feature in operating systems and virtual machines.

New!!: Buffer overflow and W^X · See more »

Xbox (console)

The Xbox is a home video game console and the first installment in the Xbox series of consoles manufactured by Microsoft.

New!!: Buffer overflow and Xbox (console) · See more »

.NET Framework

.NET Framework (pronounced dot net) is a software framework developed by Microsoft that runs primarily on Microsoft Windows.

New!!: Buffer overflow and .NET Framework · See more »

64-bit computing

In computer architecture, 64-bit computing is the use of processors that have datapath widths, integer size, and memory address widths of 64 bits (eight octets).

New!!: Buffer overflow and 64-bit computing · See more »

Redirects here:

Buffer Overflow, Buffer overflows, Buffer overrun, Buffer overruns, Buffer-overrun, Stack smash, Xrun.

References

[1] https://en.wikipedia.org/wiki/Buffer_overflow

OutgoingIncoming
Hey! We are on Facebook now! »