Open in app
Home
Notifications
Lists
Stories

Write
Scott Cosentino
Scott Cosentino

Home
About

Published in CodeX

·Aug 2, 2021

Introduction to Assembly Programming in ARM — Basic Arithmetic

In any programming language, it is essential to know how to manipulate numeric values. In assembly, there are a number of operations available to help us add, subtract, and multiple numbers. …

Assembly Language

4 min read

Introduction to Assembly Programming in ARM — Basic Arithmetic
Introduction to Assembly Programming in ARM — Basic Arithmetic

Published in CodeX

·Jul 30, 2021

Introduction to Assembly Programming in ARM — Addressing Modes

To be able to store and access data efficiently, ARM provides us with a set of addressing modes. An addressing mode is a rule that is used to interpret or modify data provided to an instruction. In this article, we will explore the different types…

Assembly Language

6 min read

Introduction to Assembly Programming in ARM — Addressing Modes
Introduction to Assembly Programming in ARM — Addressing Modes

Dec 10, 2020

The 5 Most Common Security Vulnerability Types of 2020

As we come close to the end of the year, it is interesting to analyze the vulnerability data to get an idea of what security issues were most commonly exploited in the year. Understanding this data can help us focus on critical and common issues to harden our application. Note…

Computer Security

5 min read

The 5 Most Common Vulnerability Types of 2020
The 5 Most Common Vulnerability Types of 2020

Dec 6, 2020

Music Theory: Basics of Pitch and Notation

Musical notation is a set of symbols that we use to communicate the sounds we want a player to create on their instrument. It can be seen as the language of music and is core to understanding most topics in music theory. We will start this article by seeing…

Music Theory

4 min read

Music Theory: Basics of Pitch and Notation
Music Theory: Basics of Pitch and Notation

Nov 18, 2020

How to Implement Graphs in Python

A graph is a structure used to represent how two or more objects connect to each other. Many problems in the computer science realm use graph representation, and as such, many algorithms revolve around efficiently finding properties in graphs. …

Python

5 min read

How to Implement Graphs in Python
How to Implement Graphs in Python

Published in The Startup

·Aug 12, 2020

How to Implement a Linked Stack in C

A stack is a set of items stored using a last-in first-out or LIFO policy. This means that the last thing that is inserted to the stack is the first thing that is removed from the stack. Often, we might think of a stack like a stack of dinner plates…

Programming

6 min read

How to Implement a LStack in C
How to Implement a LStack in C

Published in Dev Genius

·Jun 23, 2020

API Exposure Vulnerabilities — A SaltStack Case Study

Looking to learn computer security and ethical hacking? Check out my course here: https://scott-s-school-51c9.thinkific.com/courses/introduction-to-ethical-hacking-and-penetration-testing. For $100, you can gain access to over 40 video tutorials discussing vulnerabilities, using Kali Linux, and Android based exploitation techniques! Recently, SaltStack had a release regarding two vulnerabilities found in their product, CVE-2020–11651 and CVE-2020–1162…

Computer Security

5 min read

API Exposure Vulnerabilities — A SaltStack Case Study
API Exposure Vulnerabilities — A SaltStack Case Study

Apr 25, 2020

The Phases of Ethical Hacking

The process of ethical hacking can be broken down into 5 main phases. These phases are: 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks In this article, I will walkthrough each of the phases to give a general overview of what each phase entails. Phase…

Cybersecurity

4 min read

The Phases of Ethical Hacking
The Phases of Ethical Hacking

Apr 25, 2020

What is Ethical Hacking?

In general, hackers can be divided into three general groups: white hats, black hats, and gray hats. White hats are ethical hackers, they use their skills to help defend a system from malicious users. Black hats are malicious hackers who use their skills for illegal or malicious purposes. Gray hats…

Cybersecurity

3 min read

What is Ethical Hacking?
What is Ethical Hacking?

Mar 17, 2020

Understanding XXE Vulnerabilities

This article will explain to you the fundamentals of XXE vulnerabilities. When a server parses XML data provided by a user, there is a risk of XXE vulnerabilities. These vulnerabilities typically leverage external entities to expose sensitive information stored on the server. This is possible due to a feature…

Computer Security

8 min read

Understanding XXE Vulnerabilities
Understanding XXE Vulnerabilities
Scott Cosentino

Scott Cosentino

Computer programmer and computer security. Youtube tutorials at: https://www.youtube.com/channel/UC7KBXRtv-EkiOFsRtpBxIbg

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable