|
You are here |
www.vusec.net | ||
| | | | |
sergioprado.blog
|
|
| | | | | This is the second part of the article about embedded Linux security. | |
| | | | |
membarrier.wordpress.com
|
|
| | | | | In the previous post we saw how the memory management unit (MMU) uses page tables to translate virtual addresses into physical ones. We will now consider the various features that such a translation enables in an operating system. In the discussion below, it is important to remember that the granularity of translation is a single... | |
| | | | |
sensepost.com
|
|
| | | | | Leaders in Information Security | |
| | | | |
jborza.com
|
|
| | | Closer to the machine I started my way with programming with Microsoft QBASIC on DOS, I did try (and succeed) to copy code for a game from a BASIC book, and it did run, but I didnt really get development back then. I didnt really understand how and why it works, and most importantly, how to write my own code to implement a different game. Later I was playing higher level languages such as Pascal and C in the high school and PHP at home. | ||