syprog.blogspot.com
System Programming: May 2012
http://syprog.blogspot.com/2012_05_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Wednesday, May 30, 2012. CreateRemoteThread. Bypass Windows 7 Session Separation. Internet is full of programmers' forums and those forums are full with questions about CreateRemoteThread. Fails if the target process is in a different session than the calling process. Well, there is. Let me start as usual, with a note for nerds. The code provided within the ar...
syprog.blogspot.com
System Programming: April 2015
http://syprog.blogspot.com/2015_04_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Friday, April 3, 2015. Linux Loadable Kernel Module in Assembly. First of all, sorry for being silent for the last two years. There have been certain reasons for this. Anyway, I am back and I am going to share a portion of what I've learnt over this period. I am not going to dive into the basics of Linux kernel structure and the way LKM support is implemented&...
syprog.blogspot.com
System Programming: Linux Loadable Kernel Module in Assembly
http://syprog.blogspot.com/2015/04/linux-loadable-kernel-module-in-assembly.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Friday, April 3, 2015. Linux Loadable Kernel Module in Assembly. First of all, sorry for being silent for the last two years. There have been certain reasons for this. Anyway, I am back and I am going to share a portion of what I've learnt over this period. I am not going to dive into the basics of Linux kernel structure and the way LKM support is implemented&...
syprog.blogspot.com
System Programming: Contact Information
http://syprog.blogspot.com/p/the-term-hacker-primarily-refers-to.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. The term 'hacker' primarily refers to those black hat individuals cracking software/web sites in order to steal, make damage, whatsoever these days. My personal preference is to give this term its original meaning (RFC 1392) - someone willing to get to the base of things. This is what I am. Given the fact that I am an independent RE and Anti Piracy Consultant ...
syprog.blogspot.com
System Programming: October 2012
http://syprog.blogspot.com/2012_10_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Monday, October 22, 2012. Exception Driven "Debugging": Getting behind anti debugging tricks. Of course, every debugging is exception driven. At least because a breakpoint generates debug exception wich is passed to debugger. In this article, however, I will refer to regular exceptions. You would be surprised to know how many vendors rely on this API alone;.
syprog.blogspot.com
System Programming: October 2011
http://syprog.blogspot.com/2011_10_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Thursday, October 13, 2011. Dennis Ritchie, R.I.P. Dennis Ritchie, the father of C language and co-creator of Unix has passed away this week. Hijack Linux System Calls: Part III. System Call Table. In case of a 64 bit system (and. System call numbers are defined in. For 32 and 64 bit platforms respectively. In this article, we are going to deal with sys op...
syprog.blogspot.com
System Programming: February 2012
http://syprog.blogspot.com/2012_02_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Wednesday, February 29, 2012. Vectored Exception Handling for Linux. Source code for this article may be found here. The title of this article may look weird. In deed, why would someone want to use Vectored Exception Handling in Linux, while this OS provides a perfectly working mechanism - signals? Well, there are several possible answers:. Signum, sighandler t.
syprog.blogspot.com
System Programming: August 2012
http://syprog.blogspot.com/2012_08_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Friday, August 31, 2012. Emulation of Hardware. CPU and Memory. In most cases, this is not a problem at all due to a large amount of available platform emulators (e.g. QEMU and many others). However, even though QEMU is quite a powerful tool, there are certain cases when it is not helpful (at least not without certain modifications). Previous, next;. Mem; / Po...
syprog.blogspot.com
System Programming: January 2013
http://syprog.blogspot.com/2013_01_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Thursday, January 10, 2013. Genetic Algorithms. Lame Example - Solving Quadratic Equation. Source code to this article may be found here. It has two roots (points where its graph crosses the X axis) at x = -0.7875184. And at x = 1.17213378. Value1, value2;. The third member of the chromosome is fitness. I = 0; i POPULATION. Population[i].value1 = ( double.
syprog.blogspot.com
System Programming: November 2011
http://syprog.blogspot.com/2011_11_01_archive.html
This blog is dedicated to low level programming in Assembler and C/C (although, C is unwelcome) in either *Nix or Windows based operating systems. Saturday, November 26, 2011. It has been a while since my last article. Special thanks to those who decided to stay with me despite the long break and welcome to new readers! For this task, but you may adjust the code for whatever environment you prefer. A short remark for nerds before we start. The code in this article does not contain any security checks...