
shishirbhat.com
Ring0 - The Inner Circleoperating system, coding, computer security, windows programming, reversing, reverse engineering
http://www.shishirbhat.com/
operating system, coding, computer security, windows programming, reversing, reverse engineering
http://www.shishirbhat.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Sunday
LOAD TIME
0.4 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
18
SSL
EXTERNAL LINKS
1
SITE IP
74.125.69.121
LOAD TIME
0.375 sec
SCORE
6.2
Ring0 - The Inner Circle | shishirbhat.com Reviews
https://shishirbhat.com
operating system, coding, computer security, windows programming, reversing, reverse engineering
Ring0 - The Inner Circle: How Big Are Your Functions?
http://www.shishirbhat.com/2014/10/how-big-are-your-functions.html
Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. October 27, 2014. How Big Are Your Functions? Couple of weeks back, there was a need to find out the code size of functions in a program I had written. I was just curious as to which functions were the biggest space hoggers. By 'code size of functions', I mean the number of bytes a function's machine code occupy in the .text. Disassembler to the rescue! First thing that came to my mind was to use dumpbin. Reading th...
Ring0 - The Inner Circle: Determining Integer Overflow
http://www.shishirbhat.com/2014/01/determining-integer-overflow.html
Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. January 21, 2014. This topic was running through my mind and I was wondering what the easiest way would be to detect overflow and underflow of integers. I searched on the internet and found some answers but all were not quite simple. Then it dawned on me that the CPU has an Overflow flag as part of the EFLAGS register! Subscribe to: Post Comments (Atom). View my complete profile.
Ring0 - The Inner Circle: May 2013
http://www.shishirbhat.com/2013_05_01_archive.html
Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. May 23, 2013. For a proof-of-concept that shows how even the two-factor authentication mechanism, used by banks to verify customers online, can be bypassed. There are a couple of popular malicious software kits that can be used to carry out attacks against online banking customers - Zeus. And their mobile phone counterparts ZitMo. Although the browser is the program you use to access banking websites, it is the unde...
Ring0 - The Inner Circle: September 2013
http://www.shishirbhat.com/2013_09_01_archive.html
Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. September 17, 2013. Windows Debugging API - Part 1. First and foremost, the debugger must enable the user to fully control the execution of the process to be debugged, called the target process from here on. This means that the user must be able to start and stop execution of the target by setting breakpoints, single stepping, break-all threads immediately and so on. The Windows debugging APIs consists of:. The call...
Ring0 - The Inner Circle: October 2014
http://www.shishirbhat.com/2014_10_01_archive.html
Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. October 27, 2014. How Big Are Your Functions? Couple of weeks back, there was a need to find out the code size of functions in a program I had written. I was just curious as to which functions were the biggest space hoggers. By 'code size of functions', I mean the number of bytes a function's machine code occupy in the .text. Disassembler to the rescue! First thing that came to my mind was to use dumpbin. Reading th...
TOTAL PAGES IN THIS WEBSITE
18
Index of /
ശിശിരം | ശിശിരത്തിലേക്ക് ഒരു യാത്ര
ശ ശ രത ത ല ക ക ഒര യ ത ര. Thanks for dropping by ശ ശ ര! Take a look around and grab the RSS feed. To stay updated. See you around! Latest Entries ». 13 വര ഷങ ങള …. Mdash; Leave a comment. January 28, 2014. Laquo; Older Entries. 13 വര ഷങ ങള …. സ വപ നങ ങള ………. ഒര മഴക ക ല. Follow Blog via Email. Enter your email address to follow this blog and receive notifications of new posts by email. Join 35 other followers. Blog at WordPress.com. Back to top ]. Send to Email Address. Email check failed, please try again.
Animation
Ask whatever u want on Animation. Sunday, July 22, 2012. Links to this post. Saturday, May 19, 2012. Links to this post. Thursday, February 2, 2012. Links to this post. Monday, December 12, 2011. Doodle - Warm Up. Links to this post. Sunday, September 4, 2011. Making of Tare Zameen Par. Links to this post. Thursday, August 4, 2011. The world's largest stop-motion animation set, shot on a Nokia N8. Links to this post. Tuesday, July 19, 2011. Links to this post. Sunday, July 3, 2011. Links to this post.
ShiShirAstro.Com
Click to Solve your problem. Select Birth Rashi :. Mesh-ARIES CHU, CHE, CHO, LA,LI, LEE, LU,LOO,LE,LO,A,E,U.E,A. Vrisha-TAURUS O,V,A,VI,VEE,VU,VOO,BA,B1,BEE,BU,BOO,VE,VO,BE,BO,KA,KI,KEE. Mithuna-GEMINI KU,GH,CHH,KE,KO,HI,HEE, KE,KO,HI,HEE. Kark-CANCER HA,HE,HO,DA, FOR (DAMRU). Singh-LEO MAA,MI,MEE,MU,MOO,ME,MO, TA FOR (TAMATAR). Kanya-VIRGO PAA, PI, PEE, DHA FOR (DHOLAK),PU, POO, THA,PE, PO, RA, RI, REE. Tula-LIBRA RU, ROO, RE, TO, TA,TI, TEE, TU, TOO, TE, TO. Makar-CAPRICORN KH,GA, GI, GEE, GU, GOO, GE.
Shishir Bakshi
Ring0 - The Inner Circle
Ring0 - The Inner Circle. Ring0 - the inner most layer in the processor's privilege ring. October 27, 2014. How Big Are Your Functions? Couple of weeks back, there was a need to find out the code size of functions in a program I had written. I was just curious as to which functions were the biggest space hoggers. By 'code size of functions', I mean the number of bytes a function's machine code occupy in the .text. Disassembler to the rescue! First thing that came to my mind was to use dumpbin. Reading th...
Brain Bank
This Blog gives You Knowledge and Good Information.It is Good For MBA/RAS/IAS And Other Exams.This Blog is also good who belongs to IT. Saturday, February 9, 2013. A Complete Paper On Cloud Computing Security. Topic Includes about Cloud Computing Security. Read Full Paper or Download from here:-. Click Here to download. If this does not work then Copy and paste following link into your Address bar:-. Wwwijritcc.org/IJRITCC Vol 1 Issue 1/IJRITCC 1309.pdf. Links to this post. Wednesday, January 23, 2013.
Ethical Hacking and Network Security
Ethical Hacking and Network Security. Monday, December 8, 2014. Mounting HFS MAC filesystem into Redhat Linux 6. Mounting HFS filesystem into Redhat Linux 6. Rpm - import http:/ elrepo.org/RPM-GPG-KEY-elrepo.org. Uvh http:/ www.elrepo.org/elrepo-release-6-6.el6.elrepo.noarch.rpm. Http:/ elrepo.org/tiki/tiki-index.php. For your version of redhat/centos. Connect the drive, it should automatically mounted or mount using following commands:. Ls / to list content of the drive. Tuesday, October 14, 2014. Examp...
Shishir Chauhan | Personal Website | UI Front end Developer
I am Shishir Chauhan. Front end ui developer. Welcome to my sassy online portfolio. Here, you can find my works, know where I worked, reach me for future work or just candidly catch-up. A celebrity quiz created with the help of web-tools like HTML5 and CSS3. I have used PHP, Ajax and MySql to fetch data dynamically. A fun, light-weight app created using HTML5 and CSS3. Check out cool CSS3 animations! Take a look here! We can locate all the stores within the seleted area. Consultant, Technical /. I had a ...
Perfumer - Shishir Kumar Singh
TREATISE | It is about some of my favourite TV Shows, Sports Personalities and a few Computer realted articles.
INDEX – To All Posts. It is about some of my favourite TV Shows, Sports Personalities and a few Computer realted articles. Stay updated via RSS. INDEX – To All Posts. 2014 Galantry Awardee List : Republic Day. 2014 Padma Awardee List : Republic Day. Rafael Nadal is Back as ATP World Number 1! Rafael Nadal wins US Open 2013! 2013 Gallantry Awardee List : Independence Day. Andy Murray Wins Wimbledon 2013! Tough Road Ahead for Roger Federer! Rafael Nadal wins (8th) French Open 2013! Mumbai Indians Win IPL 6!