From Wikipedia, the free encyclopedia

Ilfak Guilfanov ( Russian: Ильфак Гильфанов, born 1966) is a Russian software developer, computer security researcher and blogger. He became well known when he issued a free hotfix for the Windows Metafile vulnerability on 31 December 2005. [1] His unofficial patch was favorably reviewed and widely publicized because no official patch was initially available from Microsoft. [2] Microsoft released an official patch on 5 January 2006.

Guilfanov was born in a small village in the Tatarstan Region of Russia in a Volga Tatar family. He graduated from Moscow State University in 1987 with a Bachelor of Science in Mathematics. He lives in Liège, Belgium and works for Hex-Rays. He is the systems architect and main developer for IDA Pro, which is Hex-Rays' commercial version of the Interactive Disassembler Guilfanov created. A freeware version of this reverse engineering tool is also available.

References

  1. ^ Lemos, Robert (February 21, 2006). "Beating Microsoft to the Patch". PC Mag. p. 111.
  2. ^ "GRC | M.I.C.E. Metafile Image Code Execution". Grc.com. Archived from the original on January 25, 2022. Retrieved November 7, 2013.


From Wikipedia, the free encyclopedia

Ilfak Guilfanov ( Russian: Ильфак Гильфанов, born 1966) is a Russian software developer, computer security researcher and blogger. He became well known when he issued a free hotfix for the Windows Metafile vulnerability on 31 December 2005. [1] His unofficial patch was favorably reviewed and widely publicized because no official patch was initially available from Microsoft. [2] Microsoft released an official patch on 5 January 2006.

Guilfanov was born in a small village in the Tatarstan Region of Russia in a Volga Tatar family. He graduated from Moscow State University in 1987 with a Bachelor of Science in Mathematics. He lives in Liège, Belgium and works for Hex-Rays. He is the systems architect and main developer for IDA Pro, which is Hex-Rays' commercial version of the Interactive Disassembler Guilfanov created. A freeware version of this reverse engineering tool is also available.

References

  1. ^ Lemos, Robert (February 21, 2006). "Beating Microsoft to the Patch". PC Mag. p. 111.
  2. ^ "GRC | M.I.C.E. Metafile Image Code Execution". Grc.com. Archived from the original on January 25, 2022. Retrieved November 7, 2013.



Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook