Jun 1, 2022Member-onlyLearning x86 with NASM — Working with Data and Stack MemoryIn this article, we will create a program that stores simple numeric data using the .data section. We will first look at the different methods of declaring data. …Programming4 min readProgramming4 min read
May 31, 2022Member-onlyLearning x86 with NASM — Your First ProgramIn this article, we will create a simple x86 assembly program using the NASM assembler on Linux. Our program will trigger an exit system call. The exit system call with quit our program, setting a status code on exit. …Assembly Language4 min readAssembly Language4 min read
Published in CodeX·Aug 2, 2021Member-onlyIntroduction to Assembly Programming in ARM — Basic ArithmeticIn any programming language, it is essential to know how to manipulate numeric values. In assembly, there are a number of operations available to help us add, subtract, and multiple numbers. …Assembly Language4 min readAssembly Language4 min read
Published in CodeX·Jul 30, 2021Member-onlyIntroduction to Assembly Programming in ARM — Addressing ModesTo be able to store and access data efficiently, ARM provides us with a set of addressing modes. An addressing mode is a rule that is used to interpret or modify data provided to an instruction. …Assembly Language6 min readAssembly Language6 min read
Dec 10, 2020Member-onlyThe 5 Most Common Security Vulnerability Types of 2020As we come close to the end of the year, it is interesting to analyze the vulnerability data to get an idea of what security issues were most commonly exploited in the year. Understanding this data can help us focus on critical and common issues to harden our application. Note…Computer Security5 min readComputer Security5 min read
Dec 6, 2020Member-onlyMusic Theory: Basics of Pitch and NotationMusical notation is a set of symbols that we use to communicate the sounds we want a player to create on their instrument. It can be seen as the language of music and is core to understanding most topics in music theory. We will start this article by seeing…Music Theory4 min readMusic Theory4 min read
Nov 18, 2020Member-onlyHow to Implement Graphs in PythonA graph is a structure used to represent how two or more objects connect to each other. Many problems in the computer science realm use graph representation, and as such, many algorithms revolve around efficiently finding properties in graphs. …Python5 min readPython5 min read
Published in The Startup·Aug 12, 2020Member-onlyHow to Implement a Linked Stack in CA stack is a set of items stored using a last-in first-out or LIFO policy. This means that the last thing that is inserted to the stack is the first thing that is removed from the stack. Often, we might think of a stack like a stack of dinner plates…Programming6 min readProgramming6 min read
Published in Dev Genius·Jun 23, 2020API Exposure Vulnerabilities — A SaltStack Case StudyRecently, SaltStack had a release regarding two vulnerabilities found in their product, CVE-2020–11651 and CVE-2020–1162. These two CVEs were able to be used by attackers to either remotely execute code, or disclose sensitive data from the server. …Computer Security4 min readComputer Security4 min read
Apr 25, 2020The Phases of Ethical HackingThe process of ethical hacking can be broken down into 5 main phases. These phases are: 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks In this article, I will walkthrough each of the phases to give a general overview of what each phase entails. Phase…Cybersecurity4 min readCybersecurity4 min read