|
You are here |
initialcommit.com | ||
| | | | |
coredumped.dev
|
|
| | | | | In this post, we are going to take a deep dive into pointer tagging, where metadata is encoded into a word-sized pointer. Doing so allows us to keep a compact representation that can be passed around in machine registers. This is very common in implementing dynamic programming languages, but can really be used anywhere that additional runtime information is needed about a pointer. We will look at a handful of different ways these pointers can be encoded and see how the compiler can optimize them for diff... | |
| | | | |
www.malwaretech.com
|
|
| | | | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | |
| | | | |
www.stylobite.com
|
|
| | | | | IT support is a vital component of any modern business. With the increasing reliance on technology, businesses need to ensure that their computer systems are running smoothly to minimize downtime and maximize productivity. Computer components are a key part of any computer system, and understanding the different components and how they work is essential for | |
| | | | |
jborza.com
|
|
| | | Closer to the machine I started my way with programming with Microsoft QBASIC on DOS, I did try (and succeed) to copy code for a game from a BASIC book, and it did run, but I didnt really get development back then. I didnt really understand how and why it works, and most importantly, how to write my own code to implement a different game. Later I was playing higher level languages such as Pascal and C in the high school and PHP at home. | ||