Which of the following attacks can be overcome by applying cryptography?
Buffer overflow
Web ripping
Sniffing
DoS
Submit