Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to
Continue readingCategory: Computer
Proxy vs. VPN (HTTP(S))
The Proxy and the VPN-Server are both a node in the communication between the client and the server. Both ways
Continue readingState (Design Pattern)
This behavioral pattern is used to let objects behave differently based on their current state.
Continue readingProxy (Design Pattern)
This structural pattern controls the access to a class. Looks similar to a decorator, but it instantiates the object by
Continue readingAdapter (Design Pattern)
This structural pattern translates one class interface into another. This is a class adapter, but there also exists an object
Continue readingSingleton (Design Pattern)
This creational pattern assures that just one object can get instantiated of that class.
Continue readingFactory (Design Pattern)
Concrete Factory … is a class that creates objects without exposing the instantiation logic. Abstract Factory … is a class
Continue readingUnwind the stack even if GDB can’t? (ARM)
Reason Since GCC 5.0 for ARM the default used ABI is AAPCS1. With AAPCS the stack unwinding works based on
Continue readingShellcode injection via buffer overflow (x64)
Disclaimer – The application has to be vulnerable (e.g. gets, scanf, strcpy) for an overflow attack. – Modern compilers are
Continue readingRL methods for ANN’s (Selection)
This article is about two common methods of reinforcement learning (RL) for artificial neural networks (ANN’s). Backpropagation … Based on
Continue reading