|
You are here |
blog.koehntopp.info | ||
| | | | |
blog.marbu.eu
|
|
| | | | | [AI summary] The article discusses the implementation and implications of the birth time (btime) timestamp in Linux, highlighting its limited support in tools and the lack of standardization. It explores use cases like forensic analysis and data hiding, and references related resources. | |
| | | | |
hjr265.me
|
|
| | | | | I remember seeing a tool many years ago that could hide other files in BMP image files. I was a bit too young to understand how it worked, but I think I understand the trick now: Understand the structure of the file type at the byte level. Find a spot that can hold an arbitrary length of data. Sneak in whatever you want in there. As a proof of concept, I used Go to make Sneak - a program to add or extract a hidden file in a ZIP archive. | |
| | | | |
blog.carlosgaldino.com
|
|
| | | | | A file system is responsible for organising and providing an abstraction over the storage devices where the data is physically stored. In this post, we will learn more about the concepts used by file systems, and how they fit together when writing your own. | |
| | | | |
vsupalov.com
|
|
| | | X11, Wayland and how they work. | ||