|
You are here |
blog.httrack.com | ||
| | | | |
blog.oddbit.com
|
|
| | | | | Overview I was recently working with someone else's C source and I wanted to add some basic error checking without mucking up the code with a bunch of if statements and calls to perror. I ended up implementing a simple must function that checks the return value of an expression, and exits with an error if the return value is less than 0. You use it like this: must(fd = open("textfile.txt", O_RDONLY)); Or: | |
| | | | |
mazzo.li
|
|
| | | | | Let's say that you have a program which relies on huge pages for performance. I couldn't find a resource fully explaining how to allocate huge pages at runtime, making sure that the huge page allocation was successful, so here it is. | |
| | | | |
www.bfilipek.com
|
|
| | | | | Some time ago I covered how to use custom deleters with smart pointers. The basic idea is to specify a dedicated method that will be called when a pointer is released. One logical application of custom deleters might be resource handles like files or the WinApi HANDLE type. Lets see how can we implement such thing. | |
| | | | |
www.politoinc.com
|
|
| | | DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it takes advantage of execution flow and allows the adversary to trigger the payload without waiting for an event (i.e. user login, application restart, reboot). | ||