Reverse Engineering Hostile Codes

Computer criminals are always ready to compromise weakness in the system with their hostile codes. Computer Viruses, Worms, Trojans, Malwares, you name it. Often these programs are custom compiled and not widely distributed. Because of this, anti-virus software won’t detect their presences. In this article we will try to outlines the process of reverse engineering […]

Continue Reading Comments

OverTheWire.org Wargames – Bandit – Level 20 to Level 29

OverTheWire.org is one of good site offer WarGames. In this context, WarGame is a game specifically designed to help people learn and practice security concepts in the form of fun-filled game. One of wargame category provided by OverTheWire is Bandit category which is aimed at absolute beginners. This writeup contains solutions of the OverTheWire challenges […]

Continue Reading Comments

OverTheWire.org Wargames – Bandit – Level 10 to Level 19

OverTheWire.org is one of good site offer WarGames. In this context, WarGame is a game specifically designed to help people learn and practice security concepts in the form of fun-filled game. One of wargame category provided by OverTheWire is Bandit category which is aimed at absolute beginners. This writeup contains solutions of the OverTheWire challenges […]

Continue Reading Comments

OverTheWire.org Wargames – Bandit – Level 0 to Level 9

OverTheWire.org is one of good site offer WarGames. In this context, WarGame is a game specifically designed to help people learn and practice security concepts in the form of fun-filled game. One of wargame category provided by OverTheWire is Bandit category which is aimed at absolute beginners. This writeup contains solutions of the OverTheWire challenges […]

Continue Reading Comments

Creating a Web Bug

Web Bug is a simple graphic on a web site or in a email that collects information about the user who is visiting the website or who is reading the email. In early day of internet, it is often used for several purpose. People often say to look for graphics which are 1×1 pixel big […]

Continue Reading Comments

Digital Forensics : Ann’s Aurora

Ann’s Aurora is a digital forensic challenge created by SANS Digital Forensics & Incident Response (DIFT). This problem is released as a public challenge for communities. The problem can be considered as network forensic released as per 2011 with not so complicated difficulty. The challenge can be seen on this link. This article will discuss […]

Continue Reading Comments

Building GCC ARM Toolchain Cross Compiler (Bare Metal)

In this article we will about how to build GCC ARM Toolchain, which is a cross compiler to build ARM program. The built GCC can be used to compile application into ARM’s machine codes. The toolchain then reside on /usr/local path. For this article, I use: Slackware64 14.0 GCC 4.9.2 GDB 7.8.1 Binutils 2.24 Newlib […]

Continue Reading Comments

C++11 Concurrency: Part 1 – Introduction to Threading in Standard Library

C++ is growing, as per new standard C++11 now it supports threading. C++11 introduce a new thread library. The new standard define utilities for starting and managing threads. It also contains utilities for synchronization like mutexes and other locks, atomic variables, and other utilities. We will get through this so called C++11 threading by series […]

Continue Reading Comments

C++ Reserved Words

C++ reserves some words for its own use and for use in C++ libraries. Thus, we shouldn’t use a reserved word as an identifier in a declaration. Reserved words comes in two categories: keywords and alternative tokens. This article will list C++ reserved words based on C++11 standard. C++ Keywords Keywords are identifiers that form […]

Continue Reading Comments

Missing Articles ?

It seems some articles are missing. I don’t know why, but i predict that there is a problem in backup of the hosting. So I will try to recover or rewrite them now.

Continue Reading Comments