And finally, here’s part 3: https://www.netlogix.at/news/artikel/password-insecurity-part-3
It might be interesting for several reasons to monitor the network traffic of Android devices to watch the network behavior of some apps. This article describes how to monitor network traffic running the Android AVD Emulator on Linux.
You have problems booting Linux from an SSD disk? You recycled an older notebook or you enhanced your newer notebook by replacing the old-school spinning harddrive with a new SSD drive and then… error: unknown filesystem. Entering rescue mode… grub rescue> You booted from an external drive and installed Linux to the SSD disk and …
Short answer: you can’t but yes, you can! This is an endlessly recurring question in many groups on the Internet. Today (2016/01/14) Google has 171 Million hits. This article answers the question and sheds some light on arrays in C. In the second part below I’ll discuss two-dimensional arrays as well. IMO, arrays are the …
Some time ago I wrote this article about using integer operations to calculate fractal images. Currently, I’m giving a course which prepares for malware analysis. Among other things we deal a lot with Intel assembler and how compilers create and optimize code. The full code of everything discussed below (and also of the article referred …
Nowadays, a responsible administrator should never run any service without TLS anymore. Unfortunately, this makes life even more difficult for several reasons. This article discusses some problems associated to certificates, specifically in respect to web applications which interactively connect to secondary services. On one hand TLS configuration requires a lot of knowledge to create a …