seccomp

2025-04-24

seccomp (secure computing mode) is a Linux kernel feature that restricts the system calls a process can make, reducing the kernel attack surface. ... Read More

telegraph

2025-04-24

Telegraph is a telecommunications system that transmits messages over long distance using electrical signals, typically via wires using Morse code. Read More

Utah

2025-04-24

Utah is a landlocked state in the western United States Read More

Alex Ionescu

2025-04-23

Alex Ionescu is a hacker, security researcher, and Windows internals expert known for co-authoring Windows Internals, his work at CrowdStrike, and ... Read More

anomaly detection

2025-04-23

Anomaly detection is the process of identifying patterns in data that deviate from expected behavior. Read More

anti-forensics categories

2025-04-23

Here are some high-level anti-forensics categories and concepts. Category Goal attack surface reduction minimize exposure. leave minimal or no traces. ... Read More

audio

2025-04-23

Audio refers to sound that is captured, transmitted, or reproduced in electronic form. Read More

bar graph

2025-04-23

A bar graph is a chart that uses rectangular bars to represent the frequency or value of categories, where the bar height is proportional to the data ... Read More

behavioral evasion

2025-04-23

Behavioral evasion refers to techniques used to avoid detection, attribution, or identification based on behavioral patterns such as timing, command ... Read More

behavioral fingerprinting

2025-04-23

Behavioral fingerprinting or profiling is the process of identifying or profiling a user, device, or operator based on patterns in their behavior such ... Read More