Posts

Windows Exploit Development (primer II) : Corrupting Structured Exception Handling and Controlling Memory Pointers

Windows Exploit Development (primer) : Debugging Threads and Analyzing Memory

[Software Philosophy] The Hegelian Triad of Software Development

Toward a critical phenomenology of closed source security

Understanding Blockchain : The theory and the threats

On Forced Open Sourcing of End of Life Software

On the ontological duality of Software and Hardware II : and What it means for Open Source.