Switch Statements

| | Switch Statements
Introduction Branching out in multiple ways, the switch statement appropriately dispenses execution to parts of code, based on the expression’s value. A switch statement is a code construct... Go on to the site to read the full article ... Read More

If Statements

| | If Statements
Introduction “If” statements in C programming are used to execute a block of statements if a certain condition is true. They allow programmers to control the execution of code and allow user inputs... Go on to the site to read the full article ... Read More

Variables

| | Variables
Introduction Variables in C are data storage units that reserve space in the memory. There are different types of variables. Each type requires different amounts of memory, but the memory... Go on to the site to read the full article ... Read More
C Code in Assembly

C Code in Assembly

| | C Code in Assembly
Introduction Reverse engineering analysts have a good grasp of C code language and how it’s converted into assembly listings. C code was designed to function as a short form of assembly language,... Go on to the site to read the full article ... Read More
Debugging for Malware Analysis

Debugging for Malware Analysis

Introduction This article provides an overview of debugging and how to use some of the most commonly used debuggers. We will begin by discussing OllyDbg; using it, we will explore topics such as... Go on to the site to read the full article ... Read More

Malware Analysis and Reverse Engineering

Introduction This article provides a high-level overview of malware analysis and reverse engineering. If you are planning to get started with malware analysis and reverse engineering, this article... Go on to the site to read the full article ... Read More
Android Hacking and Security, Part 2: Content Provider Leakage

Android Hacking and Security, Part 2: Content Provider Leakage

| | feature, Hacking
In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss “Content Provider Leakage.” What... Go on to the site to read the full article ... Read More
AWS Cloud Security for Beginners — Part 2

AWS Cloud Security for Beginners — Part 2

| | cloud computing
Introduction In the previous part of this series, we set up our free-tier account and then configured AWS CLI. In this article, we will discuss S3 buckets and the security concepts associated with... Go on to the site to read the full article ... Read More
AWS Cloud Security for Beginners — Part 1

AWS Cloud Security for Beginners — Part 1

| | cloud computing
Introduction Cloud computing has gained enormous attention during the past few years, and a lot of companies are shifting their infrastructure into the cloud environments. With most of the cloud... Go on to the site to read the full article ... Read More