Summary:This article provides an overview of different evasion techniques used to bypass security measures in software or…
The task of building a Natural Language Processing (NLP) text summarizer in one night from scratch is…
I was on an engagement where I simply could not elevate privileges, so I had to become…
On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some…
AWS Startup Security Baseline (AWS SSB) The Amazon Web Services (AWS) Startup Security Baseline (SSB) is a…
When a programmer presses ctrl-c inside of a command-line program, that program should stop what it’s doing, return to…
This post is an analysis of a file encryption solution that claimed to implement “AES-1024 military grade…
CAP Theorem explained You’ll often hear about the CAP theorem which specifies some kind of an upper…
Starting October 28th and fully resolving on October 31st, Roblox experienced a 73-hour outage.¹ Fifty million players regularly…