Sunday, December 22, 2024
Home Tags Security

Tag: Security

TCP Flags Guide

0

LDAP Explained

0
- Advertisement -
Google search engine

RECENT

SIMILAR

What’s Log4j and Log4Shell vulnerability

0
Log4j is a widely-used Java-based library developed by Apache Software Foundation that’s designed to enable developers log various levels of information (trace, debug, info, warn, error, and fatal) from their applications for troubleshooting and monitoring purposes. It has appenders that are responsible for determining...

PE Headers and Sections Explained

0
The Portable Executable (PE) format is a file format for executables, object code, DLLS, and others used in Windows operating systems. The structure of a PE file includes several headers, each serving a specific purpose. Understanding those are crucial for reverse engineering, debugging, and malware...

Simple Concepts of Reverse Engineering

0
Reverse engineering in cybersecurity involves analysing software, systems, or hardware to understand their design, functionality and behaviour. The goal is often to uncover vulnerabilities, analyse malware, or understand proprietary systems for security research and defence. Key Concepts Disassembly: Converts machine code (binary) into assembly language, we...