Google does not want you to encrypt your drives

I have been running small Google’s Adwords campaign to lure innocent visitors to my blog. My Ad’s were disabled for some time since I couldn’t afford to pay for them. Recently (couple days ago) I re-enabled the ads in hopes of increasing visitor count. I managed to get couple hundred clicks and I was happy […]

Read more

Exploits Tutorial: The Memory Concepts

In order to compromise a computer system, you need to first find a vulnerability in it’s defenses and successfully exploit the vulnerability. (Un-)Fortunately modern computer systems employs multiple different defenses in order to stop you. In this series we learn of couple different types exploits and how we can exploit them. Computer Science 101 When […]

Read more