Thanks for showing interest in my website, I hope you are some creative security guy/enthusiastic/hacker who wants to be a part of Prohack and use it as a platform to showcase his/her original research/rant/anything that caters to higher mortals.
Articles related to -
(list shamelessly ripped off from GRECON CFP)
Articles related to -
(list shamelessly ripped off from GRECON CFP)
- Reverse Engineering and Obfuscation
- Vulnerability Discovery, Analysis and Exploit Automation
- Embedded Systems Security, including Smartphone Security
- Hardware Vulnerabilities
- Malware Creation, Analysis and Prevention
- Web Application Security
- Network Infiltration & Ex-filtration
- Intrusion Detection and Prevention
- Security and Privacy in Cloud, P2P Networks
- Penetration Testing
- Disclosure and Ethics
- Digital Forensics
- Applied Cryptography and Cryptanalysis
- Exotic protocols (SITA anyone ?), geek stuff or anything that caters to the higher mortals.
For a sample guest article you can read this one on Anti Debugging .
(I hope you get my point.)
If it catches my fancy and is devoted to the above genres, I will be more than glad to publish it with your credentials.
Regards
Rishabh Dangwal
If it catches my fancy and is devoted to the above genres, I will be more than glad to publish it with your credentials.
Regards
Rishabh Dangwal
Sir,
ReplyDeletewhen a physical address is used as a memory address by a user program????