Open in app

Sign In

Write

Sign In

Scott Cosentino
Scott Cosentino

259 Followers

Home

About

Jun 1, 2022

Learning x86 with NASM — Working with Data and Stack Memory

In this article, we will create a program that stores simple numeric data using the .data section. We will first look at the different methods of declaring data. …

Programming

4 min read

Learning x86 with NASM — Working with Data and Stack Memory
Learning x86 with NASM — Working with Data and Stack Memory
Programming

4 min read


May 31, 2022

Learning x86 with NASM — Your First Program

In this article, we will create a simple x86 assembly program using the NASM assembler on Linux. Our program will trigger an exit system call. The exit system call with quit our program, setting a status code on exit. …

Assembly Language

4 min read

Learning x86 with NASM — Your First Program
Learning x86 with NASM — Your First Program
Assembly Language

4 min read


Published in CodeX

·Aug 2, 2021

Introduction to Assembly Programming in ARM — Basic Arithmetic

In any programming language, it is essential to know how to manipulate numeric values. In assembly, there are a number of operations available to help us add, subtract, and multiple numbers. …

Assembly Language

4 min read

Introduction to Assembly Programming in ARM — Basic Arithmetic
Introduction to Assembly Programming in ARM — Basic Arithmetic
Assembly Language

4 min read


Published in CodeX

·Jul 30, 2021

Introduction to Assembly Programming in ARM — Addressing Modes

To be able to store and access data efficiently, ARM provides us with a set of addressing modes. An addressing mode is a rule that is used to interpret or modify data provided to an instruction. …

Assembly Language

6 min read

Introduction to Assembly Programming in ARM — Addressing Modes
Introduction to Assembly Programming in ARM — Addressing Modes
Assembly Language

6 min read


Dec 10, 2020

The 5 Most Common Security Vulnerability Types of 2020

As we come close to the end of the year, it is interesting to analyze the vulnerability data to get an idea of what security issues were most commonly exploited in the year. Understanding this data can help us focus on critical and common issues to harden our application. Note…

Computer Security

5 min read

The 5 Most Common Vulnerability Types of 2020
The 5 Most Common Vulnerability Types of 2020
Computer Security

5 min read


Dec 6, 2020

Music Theory: Basics of Pitch and Notation

Musical notation is a set of symbols that we use to communicate the sounds we want a player to create on their instrument. It can be seen as the language of music and is core to understanding most topics in music theory. We will start this article by seeing…

Music Theory

4 min read

Music Theory: Basics of Pitch and Notation
Music Theory: Basics of Pitch and Notation
Music Theory

4 min read


Nov 18, 2020

How to Implement Graphs in Python

A graph is a structure used to represent how two or more objects connect to each other. Many problems in the computer science realm use graph representation, and as such, many algorithms revolve around efficiently finding properties in graphs. …

Python

5 min read

How to Implement Graphs in Python
How to Implement Graphs in Python
Python

5 min read


Published in The Startup

·Aug 12, 2020

How to Implement a Linked Stack in C

A stack is a set of items stored using a last-in first-out or LIFO policy. This means that the last thing that is inserted to the stack is the first thing that is removed from the stack. Often, we might think of a stack like a stack of dinner plates…

Programming

6 min read

How to Implement a LStack in C
How to Implement a LStack in C
Programming

6 min read


Published in Dev Genius

·Jun 23, 2020

API Exposure Vulnerabilities — A SaltStack Case Study

Recently, SaltStack had a release regarding two vulnerabilities found in their product, CVE-2020–11651 and CVE-2020–1162. These two CVEs were able to be used by attackers to either remotely execute code, or disclose sensitive data from the server. …

Computer Security

4 min read

API Exposure Vulnerabilities — A SaltStack Case Study
API Exposure Vulnerabilities — A SaltStack Case Study
Computer Security

4 min read


Apr 25, 2020

The Phases of Ethical Hacking

The process of ethical hacking can be broken down into 5 main phases. These phases are: 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks In this article, I will walkthrough each of the phases to give a general overview of what each phase entails. Phase…

Cybersecurity

4 min read

The Phases of Ethical Hacking
The Phases of Ethical Hacking
Cybersecurity

4 min read

Scott Cosentino

Scott Cosentino

259 Followers

Computer programmer and computer security. Youtube tutorials at: https://www.youtube.com/channel/UC7KBXRtv-EkiOFsRtpBxIbg

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech