Archive for the ‘Security’ Category
It’s been a long time since I posted something on my blog. and then, a twitter discussion with a friend sparked this thought in my mind. I am no expert on Google TV but given the nature of my job, i feel that I understand TV industry in some way now.
My friend questioned the existence [...]
About 10 days ago, the news broke out specifying that Twitter was attacked by a hacker and sensitive information was taken out and published. Twitter denied it but now, it is public how the outage took place. The Hacker himself has done the honours to detail how he achieved this feat and the rationale behind [...]
My brother, Shantanu Goel and I, have started another blog called http://www.safercode.com which is an aim to tell people about some tips and tricks to make your code safer, secure and faster.
You’ll find quite a few interesting discussions and concepts about code optimization, securing coding, safety and reverse engineering on this website. The [...]
” Abguvat zhpu.. V unir orra hfvat guvf fznyy hgvyvgl sbe n ybat gvzr jurarire V jvfu gb jevgr fbzrguvat rapelcgrq.
Jul naq Jura qb V jevgr rapelcgrq? V qb vg jura V nafjre fbzr dhrfgvbaf va n choyvp sbehz naq fgvyy, qb abg jvfu gb fcbvy gur sha sbe bguref. Guvf jnl V gryy [...]
Cracking softwares is one of the favorite pastimes for everyone. Everyone loves to use cracked versions of games, IDEs, utilities et cetera so that they don’t have to pay for the licensing fee. Now, Licensing schemes vary from company to company and software bundling too. I definitely appreciate the efforts put by engineers in cracking [...]
Isn’t the title of the post geeky enough? Atleast I think so, I never thought of something like this even in my dreams until I came across this research from the Security and Cryptography Laboratory at Ecole Polytechnique Federale de Lausanne.
Can you just imagine, Everything you type on your keyboard sitting alone in [...]
Alright!! this news is an old shit. I was thinking to write about it for many months but was always wary of the leagal bindings I have with my company. Now, that the news is old, stale and widely public, I feel like talking about it.
Satellite TV hacking has been in a lot of focus [...]
Everyone has seen a smart card in some form, may be its your driving license, your banking card, or your STB card. smart cards are being used in daily life. Now, why smart cards? is it just a fancy stuff or just some data holder or data holder with security.
yes, security is one of [...]
Okay.. finally i managed some more time to write a post. Although, the stuff I post on my tech blog is not a very complex one as I just post basics but I aim to provide just reference in regards to bytecode reverse engineering.
Alright!!! this time again, I’ll deviate from the topic and I’ll talk [...]
Okay, Last time I deviated from the topic a bit but nevertheless, it still deserved to mention the importance of secure programming to keep away novices from breaking a system just by some invalidated inputs.
Now, let’s get back to Bytecodes. Let me put the disclaimer first that these posts of mine are not tutorials [...]