We’ll take a look at how the VM can be messed with using two files from file system
In order to understand how to hack the VM, we need to understand what it is first. We won’t go in-depth, but it is basically a memory management technique that helps you solve memory problems by managing your application’s resources and avoiding memory fragmentation.
It takes the memory addresses that an executable or application on your PC needs to function and maps them to physical memory (generally RAM). …
Throughout this article we’ll take a look at which problems Virtual Memory (VM onward) solves and how it actually maps into RAM
What VM actually does is add a level of indirection between Virtual Program Addresses and Physical Addresses (RAM). Virtual program addresses would map directly into RAM if it wasn’t for this process. Now, that’s a lot of jargon, I know, so let’s look at the problems VM solves and you will start to see the big picture of how it works.
The first thing VM solves is it allow us to map memory to disk, the hard drive…
Explained with drawings
In the following pictures, we will take an in-depth look at the following code:
float _pow_recursion(float x, float y)
if (y == 0)
if (y < 0)
return (_pow_recursion(x, y + 1) / x);
return (_pow_recursion(x, y - 1) * x);
What you are seeing here is a recursive function, which is a function that calls itself. It has 3 execution stages, set as if statements. The first one returns a value of 1, if our variable Y is equal to 0; the second one is executed if Y is lower than 0…
The experience we get when browsing the web is a rather simplistic one, stream lined. We write the domain name of the website we want to visit, hit enter, and that’s it. What is going on under the hood is way more convoluted than that. In order to see what is happening, I will try to explain what goes on from the moment you hit enter, to the moment your browser displays the desired website on screen. Before I can do that though, I will need to explain certain concepts first.
An introduction, and some ramblings on security, of IoT.
IoT is defined, in Wikipedia, as:
The Internet of things (IoT) describes the network of physical objects — “things” — that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.
The definition is very accurate, but lends itself to simplification. Sometimes it’s hard to understand new concepts when put in such stark terms.
What I will try to do here is go from a stark explanation of the subject, to a more amicable, accessible one. Why…