I just discovered this very cool article about faking fingerprints: How to fake fingerprints?.
I love CCC :)
read moreThere are comments.
I just discovered this very cool article about faking fingerprints: How to fake fingerprints?.
I love CCC :)
read moreThere are comments.
This article is about writing exploit using the Metasploit Framework, for very secure software: bof-server ;)
Bof-server has been written especially to be exploited during this article, and as you already guessed by looking at it's name, we will exploit a stack overflow bug. You can find bof-server here:
read more
There are comments.
This is the first article of a (I hope) long series of articles about 'The Basics: What everyone should know about' :)
The calling convention defines the way a function or a piece of code should arrange data before calling a function, and what to do after. It responds to questions ...
read moreThere are comments.
« Page 2 / 2