
badcoded.blogspot.com
badcodedhelping to exploit
http://badcoded.blogspot.com/
helping to exploit
http://badcoded.blogspot.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Wednesday
LOAD TIME
0.5 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
19
SSL
EXTERNAL LINKS
41
SITE IP
172.217.10.129
LOAD TIME
0.453 sec
SCORE
6.2
badcoded | badcoded.blogspot.com Reviews
https://badcoded.blogspot.com
helping to exploit
badcoded: Memory Corruption and Hacker Folklore
http://badcoded.blogspot.com/2010/06/memory-corruption-and-hacker-folklore.html
Tuesday, June 1, 2010. Memory Corruption and Hacker Folklore. Nice work by haroon from. Thinkst Applied Research, he is making an interactive timeline. Of the history of memory corruption vulnerabilities and exploit techniques. You can submit events using this form. Subscribe to: Post Comments (Atom). Subscribe in a reader. Memory Corruption and Hacker Folklore. User Supplied Format String.
badcoded: Valgrind 3.3.0 released
http://badcoded.blogspot.com/2007/12/valgrind-330-released.html
Sunday, December 16, 2007. Valgrind 3.3.0 released. Valgrind is an award-winning. Suite of tools for debugging and profiling Linux programs. With the tools that come with Valgrind, you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable. You can also perform detailed profiling, to speed up and reduce memory use of your programs. The main excitement in 3.3.0 is new and improved tools. Helgrind. Subscribe in a reader.
badcoded: New Microsoft Security Vulnerability Research and Defense blog
http://badcoded.blogspot.com/2007/12/new-microsoft-security-vulnerability.html
Friday, December 28, 2007. New Microsoft Security Vulnerability Research and Defense blog. New Microsoft technical blog about security vulnerabilities RSS. We are excited to have this outlet to share more in-depth technical information about vulnerabilities serviced by MSRC security updates and ways you can protect your organization from security vulnerabilities. You can read much more about the goals of the blog and about the. Subscribe to: Post Comments (Atom). Subscribe in a reader.
badcoded: Smashing The Modern Stack For Fun And Profit
http://badcoded.blogspot.com/2007/12/smashing-modern-stack-for-fun-and.html
Tuesday, December 18, 2007. Smashing The Modern Stack For Fun And Profit. Craig J. Heffner article about the problems he found while reading and following the examples in Smashing The Stack For Fun And Profit. Using a modern Linux system. The GNU C Compiler. Stack For Fun And Profit. Subscribe to: Post Comments (Atom). Subscribe in a reader. New Microsoft Security Vulnerability Research and . Double Free Vulnerabilities on Windows. Smashing The Modern Stack For Fun And Profit. CERT Secure Coding Projects.
badcoded: Project Shellcode
http://badcoded.blogspot.com/2009/04/project-shellcode.html
Friday, April 17, 2009. The first stage of Project Shellcode aims to become the knowledge base for all shellcode related resources, including white papers, tutorials, tools, links, assembly code, and of course shellcode. Is not clear if the project is active or not. Subscribe to: Post Comments (Atom). Subscribe in a reader. User Supplied Format String.
TOTAL PAGES IN THIS WEBSITE
19
Gutes' little stack: RFC: Traits for PHP
http://littlestack.blogspot.com/2008/02/rfc-traits-fro-php.html
Stacks were made to support men, be careful you don't stand on a paper one! February 21, 2008. RFC: Traits for PHP. Reading PHP-internals list ( http:/ news.php.net/php.internals. I found that Stefan Marr sent a very interesting patch. It's an implementation of Traits for PHP. But what does Traits stand for? Traits are basically Behavioral Blocks which group functionality (they group methods / functions indeed). Public void method1();. Public int method2();. Public void methodA();. Public int methodB();.
Gutes' little stack: List comprehensions and generators: Python and haskell for beginers
http://littlestack.blogspot.com/2009/09/list-comprehensions-and-generators.html
Stacks were made to support men, be careful you don't stand on a paper one! September 14, 2009. List comprehensions and generators: Python and haskell for beginers. Are features I always liked from Python. I'll try to write a post I would love to read some time ago when I first met these wonders. A comprehension list is a way to obtaining a lis in a "descriptive fashion", for example: the list of the first ten powers of 2:. 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024]. 2* n for n in range(0,11)]. Now we ...
Gutes' little stack: Hack.Lu 08
http://littlestack.blogspot.com/2008/11/hacklu-08.html
Stacks were made to support men, be careful you don't stand on a paper one! November 3, 2008. Finally got home from the old continent. I've been presenting a work I've working on the last months. First of all I must say the organization of Hack.Lu. Was great. It's a small single-track conference where most of the people are from France, Germany, Belgium and of course, Luxembourg! As for the talks, there were quite several I liked, I will only mention two:. The guys from RedTeam Pentesting GmbH. I recentl...
cosas de jb: January 2008
http://cosas-jb.blogspot.com/2008_01_01_archive.html
Wednesday, January 30, 2008. Kmeans y c template metaprogramming. Estoy haciendo una implementacion de kmeans tratando de hacer la maxima cantidad de cosas posibles con templates metaprogramming, para transferir en el codigo el conocimiento que ya tengo en tiempo de compilacion. Me aparecio este petit problema (gracias g , sos lindo. por suerte ya lo resolvi):. URL:http:/ developer.apple.com/bugreporter. For instructions.make: * * [main] Error 1. Subscribe to: Posts (Atom). I don't see any method (at all).
cosas de jb: La culpa no es de los floats
http://cosas-jb.blogspot.com/2013/02/la-culpa-no-es-de-los-floats.html
Sunday, February 24, 2013. La culpa no es de los floats. Sino, del que le da de comer. Al final del ultimo post. Comenté mi preocupación por la lenta convergencia, y culpe apresuradamente al uso de los objetos de tipo float. Haciendo cuentas noté que no había nada raro en la convergencia. Tilde{ pi} = 4 * frac{ sum n {t=1}I( text{punto i esta dentro de circulo})}{n} ]. Esto se puede reescribir de la siguiente forma:. E[ tilde{ pi}] = 4 * frac{E[Y]}{n} = 4 * frac{ pi}{4} * n * frac{1}{n} = pi ]. Estaba mi...
cosas de jb: December 2007
http://cosas-jb.blogspot.com/2007_12_01_archive.html
Friday, December 28, 2007. Information Entropy y k-means. Hace un par de semanas me encontre con la medida de la entropia de Shannon. Es simplemente esta formula:. I = -∑p. N es la cantidad de elementos en todo el conjunto, y N. Es la cantidad de elementos en cada uno de los k i-subconjuntos. Parece una formula simple, pero en realidad, simplemente mirandola, no podia entender su significado. En principio parece una esperanza, en particular, la -E(ln. I = -∑p. N) - ∑p. N) - ∑N/k*ln. N) - ∑N/k*[ln. Todo e...
cosas de jb: Arboricultura: parte 1
http://cosas-jb.blogspot.com/2013/04/arboricultura-parte-1.html
Wednesday, April 3, 2013. Leí algo que había leído hace como un millón de años: los arboles de Huffman. La pregunta que responde es simple: dado un texto formado por símbolos, ¿cual es la forma de codificar cada símbolo para minimizar el tamaño final del texto codificado? Existe la definición de distribuciones Fat-tailed. Que no es la misma que Heavy-tailed. No lo sé, pero creo que sí :). Para probarlo hice lo siguiente:. Generé muestras de tamaño (n = 100000 ) de varias distribuciones. Para la uniforme ...
cosas de jb: Generación de variables normales con una matriz de covarianzas
http://cosas-jb.blogspot.com/2010/12/generacion-de-variables-normales-con.html
Friday, December 31, 2010. Generación de variables normales con una matriz de covarianzas. Este es un problema que tuve hace un tiempo, que lo solucione de otra forma (no me acuerdo como). Hace poco se me apareció esta solución, y me pareció interesante. Nosotros tenemos una matriz de NxN. De covarianzas ( C. Queremos generar m samples aleatorios de N. Normales que respeten esa matriz de covarianzas. Como la matriz C. Es real y simétrica, podemos encontrar una eigen decomposition:. C = RDR tr. U = XR tr.
cosas de jb: August 2007
http://cosas-jb.blogspot.com/2007_08_01_archive.html
Friday, August 10, 2007. Calculando RSA con una regla. Esta historia se me puede hacer un poco larga. Hace un tiempo, tenuki. Me conto que se podia multiplicar usando rectas. El asunto es asi (hice dibujitos):. Supongamos que quiero multiplicar 4 * 5 (señorita señorita, esa la se! La pregunta seria que tiene esto que ver con RSA. Para eso necesitamos poder elevar un numero a una potencia (elevar es multiplicar un numero por si mismo n veces). Receta para calcular 3 5 (4 porciones):. Partiendo del punto 1...
TOTAL LINKS TO THIS WEBSITE
41
Blog de badcoco111 - Blog de badcoco111 - Skyrock.com
Mot de passe :. J'ai oublié mon mot de passe. Coucou moi sait chloé ma vie et tout le reste. Mise à jour :. Abonne-toi à mon blog! Nom : Ra.y. Adressse msn: ti .a crus@hotmail.fr. TeL: 02 ti a cru 89. N'oublie pas que les propos injurieux, racistes, etc. sont interdits par les conditions générales d'utilisation de Skyrock et que tu peux être identifié par ton adresse internet (67.219.144.114) si quelqu'un porte plainte. Ou poster avec :. Posté le mardi 30 juin 2009 06:54. Je vou kif tousse. Retape dans l...
BadCod
Video Game Motion Sickness. Tuesday, August 23, 2011. Call of Duty errant good game: 42 Stabs in a Single Gun Game Wager Match. When my friends and I get bored, we hop into Gun Game Wager Matches and just stab the @#$% out of everyone. Why? It's good practice for stabbing. It's a nice change of pace when regular player matches get frustrating. Just thought I'd share the results of my recent record setting performance (among my group of friends) with some nice Call of Duty Elite screenshots. Because it in...
badcode.com
badcoded
Tuesday, June 1, 2010. Memory Corruption and Hacker Folklore. Nice work by haroon from. Thinkst Applied Research, he is making an interactive timeline. Of the history of memory corruption vulnerabilities and exploit techniques. You can submit events using this form. Thursday, June 11, 2009. Bypassing DEP on Win2003 SP2. David Kennedy “ReL1K” published. Bypassing Hardware based Data Execution Prevention on Windows 2003 Service Pack 2 PDF. Friday, April 17, 2009. Is not clear if the project is active or not.
badcodenobiscuit.wordpress.com
Bad Code, No Biscuit | Adventures in software/release engineering
Bad Code, No Biscuit. Adventures in software/release engineering. This man knows what he’s talking about. I wish more people would listen to him. (Video after the jump.). Posted at 5:58 pm on April 19, 2011 Leave a comment. Filed Under: Software Development. Continue reading →. Your Company Is Not Facebook. Posted at 2:49 pm on January 17, 2011 Leave a comment. Filed Under: Software Development. Continue reading →. Your Company Is Not Facebook. Blog at WordPress.com.
BadCoder Consolation, Atari Jaguar Video-Games Programming and Development
Atari Jaguar Video-Games Programming and Development. BadCoder is hoping to demonstrate, (using the discontinued but powerful Atari Jaguar console as an example,) that almost anybody can program (or help to develop) imaginative and fun video-games, given enough effort and some clear advice. His focus is only on classic consoles gaming. To the Atari Jaguar stuff! Don has done me the honour of awarding me the IC-When Eye-Site 2001 award for my continued support of Jaguar programming.