|
You are here |
www.goncharov.xyz | ||
| | | | |
sergioprado.blog
|
|
| | | | | Have you ever wondered how the Linux kernel is tested? | |
| | | | |
binarydebt.wordpress.com
|
|
| | | | | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as... | |
| | | | |
mouha.be
|
|
| | | | | [AI summary] The blog post introduces buffer overflow attacks on Linux x86-64 platforms, explaining how to generate and execute shellcode using tools like Docker and mprotect() to bypass stack protection mechanisms. | |
| | | | |
www.anmolsarma.in
|
|
| | | TL;DR: DCCP is a relatively newer transport layer protocol which draws from both TCP and UDP. Jump straight to the example C code. Background Historically, the majority of the traffic on the Internet has been over TCP which provides a reliable connection-oriented stream between two hosts. UDP has been mainly used by applications whose brief transfers would be unacceptably slowed by TCP's connection establishment overhead or those for which timeliness is more important than reliability. | ||