Of course, he may have a plan B. Namely the punch tactic, which starts by creating a hole in the steel door or wall, and “punching” the lock out of contact with the cam. Stack On safe walls are equipped with 11 gauge steel at best. The 12 gauge inside the safe may be a powerful weapon, but it’s not going to take a whole lot to get to it if you’re dealing with a burglar who knows what he’s doing. Thin walls and the lack of a redundant spring loaded relocking system, make this a bit vulnerable to said attack methods. Again, I’m just not that impressed, and I wouldn’t even consider spending any money on their non fire resistant safes – I’d honestly rather just save a few hundred bucks and go with a gun cabinet instead. As far as their gun cabinets go, theirs are very slick. Sure, a determined burglar is going to rip into a gun cabinet a little faster than a generic Stack On “Security Gun Safe”, but the difference isn’t worth the extra money…at least not to me. With anything short of their Total Defense or Elite model safes, I think I’d just be fooling myself.
For items weighing over 150 lbs we include a free curbside delivery, this will get the truck to your home or business, they will unload the safe with a lift gate to the ground level. The carrier will call in advance to schedule delivery. Depending on the weight of the safe you may want to arrange for additional help to bring the safe inside. Please contact us before the item ships if you live on a rural route, area not serviced by freight carriers, or on an Island. If you have a narrow, steep, or inaccessible driveway for an 18 wheel truck and trailer, you will need to upgrade to our Bronze, Gold or Platinum level service (generally delivered on a 26' truck). If inaccessible by a 26' truck or larger, please call us for further options.
Malicious parties may attempt a stack smashing attack that takes advantage of this type of implementation by providing oversized data input to a program that does not check the length of input. Such a program may copy the data in its entirety to a location on the stack, and in so doing it may change the return addresses for procedures that have called it. An attacker can experiment to find a specific type of data that can be provided to such a program such that the return address of the current procedure is reset to point to an area within the stack itself (and within the data provided by the attacker), which in turn contains instructions that carry out unauthorized operations.