vuln: auditing source code
most common vulnerabilities: memory corruption: same data copied into memmory parts not assigned for it. often comes with these functions: strcat, strcpy, ...
most common vulnerabilities: memory corruption: same data copied into memmory parts not assigned for it. often comes with these functions: strcat, strcpy, ...
types (int,long,..) often vary in size and therfore one uses standard types: qtypes_t where q is a qualifier, type is the base type, s is the width in bits a...
eip: address in memory of next instruction registers: some hold important addresses other used for temporary data on 32-bit architecture 8 registers are us...
a compiler translates source code into machine level code preprocessor: inlcudes and macros are expanded compiler: generates assembly code compiler: generat...
super easy explanation given in this link the usual workflow for changing is as follows: local changes add: local index commit: local head push: reposito...