A Comfy Corner for Software, Security, Cloud, and AI
How security professionals evaluate a website
Adding more metadata to images
Keeping track of changes made by intruders
From memory leaks to race conditions
Understand and detect post-exploitation changes
How misconfigurations lead to privilege escalation
But you should use them anyway
When even linux system utilities lie to you
Understanding what information attackers are looking for
Securing enterprise linux in less than a minute