Posts Tagged ‘Security’
About 10 days ago, the news broke out specifying that Twitter was attacked by a hacker and sensitive information was taken out and published. Twitter denied it but now, it is public how the outage took place. The Hacker himself has done the honours to detail how he achieved this feat and the rationale behind [...]
My brother, Shantanu Goel and I, have started another blog called http://www.safercode.com which is an aim to tell people about some tips and tricks to make your code safer, secure and faster.
You’ll find quite a few interesting discussions and concepts about code optimization, securing coding, safety and reverse engineering on this website. The [...]
” Abguvat zhpu.. V unir orra hfvat guvf fznyy hgvyvgl sbe n ybat gvzr jurarire V jvfu gb jevgr fbzrguvat rapelcgrq.
Jul naq Jura qb V jevgr rapelcgrq? V qb vg jura V nafjre fbzr dhrfgvbaf va n choyvp sbehz naq fgvyy, qb abg jvfu gb fcbvy gur sha sbe bguref. Guvf jnl V gryy [...]
Alright!! this news is an old shit. I was thinking to write about it for many months but was always wary of the leagal bindings I have with my company. Now, that the news is old, stale and widely public, I feel like talking about it.
Satellite TV hacking has been in a lot of focus [...]
Everyone has seen a smart card in some form, may be its your driving license, your banking card, or your STB card. smart cards are being used in daily life. Now, why smart cards? is it just a fancy stuff or just some data holder or data holder with security.
yes, security is one of [...]
Okay.. finally i managed some more time to write a post. Although, the stuff I post on my tech blog is not a very complex one as I just post basics but I aim to provide just reference in regards to bytecode reverse engineering.
Alright!!! this time again, I’ll deviate from the topic and I’ll talk [...]
Okay, Last time I deviated from the topic a bit but nevertheless, it still deserved to mention the importance of secure programming to keep away novices from breaking a system just by some invalidated inputs.
Now, let’s get back to Bytecodes. Let me put the disclaimer first that these posts of mine are not tutorials [...]
Last time, I talked about how to write strongly typed enum patterns so as to prevent breaking the program from invalid inputs and keeping the program short and sweet for efficiency. Although, I wanted to continue on discussing bytecode but then, I felt like discussing Tainted Object Propagation as I mentioned in my last post.
Alright!!! Let’s get started. This is one of many subjects which always overwhelms me. Why so? Ofcourse, the reasons can not be explained here but then, the reason should be the least of your worries.
Okay, if you know enough about this, then please post your knowledge tips as comments because your comments might help towards my [...]