Other articles

  1. Anatomy of a Modern Memory Corruption Exploit - Part I

    Mon 27 March 2023

    This is part one of a series of articles. Here is part two.

    Introduction

    I think my interest in computer security was initially sparked in the 1990s by movies like Sneakers and The Net and then by the book Practical Unix and Internet Security. Since then I have dabbled in …

    read more

Page 1 / 1