Posts

Understanding Buffer Overflow Attacks: A Deep Dive into Memory Exploitation

Buffer overflow attacks remain one of the most fundamental yet dangerous vulnerabilities in computer systems. Despite being discovered …

Understanding Shor's Algorithm: The Quantum Breakthrough in Cryptography

Shor’s Algorithm is a quantum computing algorithm that has caused a paradigm shift in cryptography. Developed by mathematician …

Zero Trust Architecture: Beyond the Perimeter Security Model

In today’s interconnected world, where the traditional network perimeter has all but dissolved, the concept of “trust but …

What is Zip Slip?

Know about the Zip Slip vulnerability.

Understanding Dirty COW - The Linux Kernel Exploit

Dirty COW is a computer security vulnerability that was discovered in the Linux Kernel in 2016. The exploit was registered under CVE …

What is an Electronic Nose?

Alexander Graham Bell once said- “Did you ever measure a smell? Can you tell whether one smell is just twice strong as another? Can you …

Exploits & Vulnerabilities with Introduction to Metasploit

Exploits and Vulnerabilities In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor like an …

File Permissions in Unix/Linux

File Permissions Unix & Linux provides Read(r),Write(w) and Execute(x) permissions to any file on the system. If you ls -l every …

The Virtual File System

File Systems In Linux Linux works on the concept of virtual file systems. Everything on a Linux/Unix system is a file. Here is a brief …

How Your Computer Starts

Every computer follows a standard boot sequence when it starts up. BIOS (Basic Input Output System) The CPU runs an instruction in …