Chaitanya Rahalkar
Home
Blog
Awesome Learning
Publications
Talks
CV
Posts
Understanding Buffer Overflow Attacks: A Deep Dive into Memory Exploitation
Buffer overflow attacks remain one of the most fundamental yet dangerous vulnerabilities in computer systems. Despite being discovered …
Jan 14, 2024
5 min read
Cybersecurity
,
System Security
,
Binary Exploitation
Understanding Shor's Algorithm: The Quantum Breakthrough in Cryptography
Shor’s Algorithm is a quantum computing algorithm that has caused a paradigm shift in cryptography. Developed by mathematician …
Jan 11, 2024
3 min read
Quantum Computing
,
Cryptography
Zero Trust Architecture: Beyond the Perimeter Security Model
In today’s interconnected world, where the traditional network perimeter has all but dissolved, the concept of “trust but …
Jan 13, 2023
7 min read
Cybersecurity
,
Network Security
,
Enterprise Security
What is Zip Slip?
Know about the Zip Slip vulnerability.
Chaitanya Rahalkar
Last updated on Oct 17, 2019
2 min read
Understanding Dirty COW - The Linux Kernel Exploit
Dirty COW is a computer security vulnerability that was discovered in the Linux Kernel in 2016. The exploit was registered under CVE …
Sep 16, 2019
5 min read
Hacking
,
Linux
What is an Electronic Nose?
Alexander Graham Bell once said- “Did you ever measure a smell? Can you tell whether one smell is just twice strong as another? Can you …
Jul 14, 2019
3 min read
Technology
Exploits & Vulnerabilities with Introduction to Metasploit
Exploits and Vulnerabilities In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor like an …
Jun 7, 2019
3 min read
Hacking
File Permissions in Unix/Linux
File Permissions Unix & Linux provides Read(r),Write(w) and Execute(x) permissions to any file on the system. If you ls -l every …
Jun 5, 2019
3 min read
Computers
,
Linux
The Virtual File System
File Systems In Linux Linux works on the concept of virtual file systems. Everything on a Linux/Unix system is a file. Here is a brief …
Jun 1, 2019
3 min read
Linux
How Your Computer Starts
Every computer follows a standard boot sequence when it starts up. BIOS (Basic Input Output System) The CPU runs an instruction in …
May 18, 2019
3 min read
Computers
»
Cite
×