Blogs

Asymptotic Analysis: Arithmetic Sequence
Asymptotic Analysis: …

Introduction

Recently, a friend who is considering a career shift to software engineering sparked a conversation about algorithms and the analysis of runtime complexity. This friend is naturally curious, often asking “why” to understand new concepts—an admirable habit that many could …

Public-Key Cryptography: Diffie-Hellman
Public-Key Cryptography: …

Public-Key Cryptography

Public-Key cryptography works by using pairs of mathematically related keys generated by cryptographic algorithms. These cryptographic algorithms are based on difficult ( one-way ) mathematical problems, such as the discrete logarithm assumption. In other words, the …

Reverse Engineering: An Introduction to Linkers
Reverse Engineering: An …

Learn about Linkers

Whether your interested in low-level development or reverse engineering malware, understanding how linkers work and being able to write your own linker script is an important skill.

I recently created a gitbook, that will elaborate on several important linker topics, such as: …