Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to
Continue readingCategory: Technology
Proxy vs. VPN (HTTP(S))
The Proxy and the VPN-Server are both a node in the communication between the client and the server. Both ways
Continue readingDownsizing
Hauptziel des Downsizing ist es die CO2-Emission und den Spritverbrauch zu senken und gleichzeitig die Leistung beizubehalten. Die Strategie ist
Continue readingState (Design Pattern)
This behavioral pattern is used to let objects behave differently based on their current state.
Continue readingProxy (Design Pattern)
This structural pattern controls the access to a class. Looks similar to a decorator, but it instantiates the object by
Continue readingAdapter (Design Pattern)
This structural pattern translates one class interface into another. This is a class adapter, but there also exists an object
Continue readingSingleton (Design Pattern)
This creational pattern assures that just one object can get instantiated of that class.
Continue readingFactory (Design Pattern)
Concrete Factory … is a class that creates objects without exposing the instantiation logic. Abstract Factory … is a class
Continue readingUnwind the stack even if GDB can’t? (ARM)
Reason Since GCC 5.0 for ARM the default used ABI is AAPCS1. With AAPCS the stack unwinding works based on
Continue readingShellcode injection via buffer overflow (x64)
Disclaimer – The application has to be vulnerable (e.g. gets, scanf, strcpy) for an overflow attack. – Modern compilers are
Continue reading