/ tags / linux
A deep dive into Linux seccomp-BPF — building syscall sandboxes from raw BPF filters to production-grade policies, with practical C examples and analysis of how Chrome, Docker, and systemd use…
A deep dive into using eBPF to build high-performance, kernel-level security monitoring tools — covering syscall tracing, network inspection, and intrusion detection with practical Python examples.
Every call to malloc hides a small miracle of systems engineering. In the time it takes your program to allocate 16 bytes, glibc’s heap allocator has consulted a multi-tiered bin system, potentially…
Dirty COW is a computer security vulnerability that was discovered in the Linux Kernel in 2016. The exploit was registered under CVE with the designation: CVE-2016-5195. Dirty COW is a root privilege…
Unix & Linux provides Read(r),Write(w) and Execute(x) permissions to any file on the system.
If you ls -l every file with its permissions will be shown.
Linux works on the concept of virtual file systems. Everything on a Linux/Unix system is a file.
Here is a brief look at the file system structure -