We’ll take a look at how the VM can be messed with using two files from file system

In order to understand how to hack the VM, we need to understand what it is first. We won’t go in-depth, but it is basically a memory management technique that helps you…

Throughout this article we’ll take a look at which problems Virtual Memory (VM onward) solves and how it actually maps into RAM

What VM actually does is add a level of indirection between Virtual Program Addresses and Physical Addresses (RAM). Virtual program addresses would map directly into RAM if it…

Explained with drawings

In the following pictures, we will take an in-depth look at the following code:

float _pow_recursion(float x, float y)
if (y == 0)
return (1);
if (y < 0)
return (_pow_recursion(x, y + 1) / x);

return (_pow_recursion(x, y - 1) * x);

What you…

An introduction, and some ramblings on security, of IoT.

IoT is defined, in Wikipedia, as:

The Internet of things (IoT) describes the network of physical objects — “things” — that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and…

Christian Campos

Sometimes writer, avid for programming.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store