Recent Posts

vuln: auditing source code

less than 1 minute read

most common vulnerabilities: memory corruption: same data copied into memmory parts not assigned for it. often comes with these functions: strcat, strcpy, ...

it basics: types and number representation

1 minute read

types (int,long,..) often vary in size and therfore one uses standard types: qtypes_t where q is a qualifier, type is the base type, s is the width in bits a...

machine level code

1 minute read

eip: address in memory of next instruction registers: some hold important addresses other used for temporary data on 32-bit architecture 8 registers are us...

compiler

1 minute read

a compiler translates source code into machine level code preprocessor: inlcudes and macros are expanded compiler: generates assembly code compiler: generat...

git usage

less than 1 minute read

super easy explanation given in this link the usual workflow for changing is as follows: local changes add: local index commit: local head push: reposito...