seccomp
2025-04-24
seccomp (secure computing mode) is a Linux kernel feature that restricts the system calls a process can make, reducing the kernel attack surface. ... Read More
telegraph
2025-04-24
Telegraph is a telecommunications system that transmits messages over long distance using electrical signals, typically via wires using Morse code. Read More
Utah
2025-04-24
Utah is a landlocked state in the western United States Read More
Alex Ionescu
2025-04-23
Alex Ionescu is a hacker, security researcher, and Windows internals expert known for co-authoring Windows Internals, his work at CrowdStrike, and ... Read More
anomaly detection
2025-04-23
Anomaly detection is the process of identifying patterns in data that deviate from expected behavior. Read More
anti-forensics categories
2025-04-23
Here are some high-level anti-forensics categories and concepts. Category Goal attack surface reduction minimize exposure. leave minimal or no traces. ... Read More
audio
2025-04-23
Audio refers to sound that is captured, transmitted, or reproduced in electronic form. Read More
bar graph
2025-04-23
A bar graph is a chart that uses rectangular bars to represent the frequency or value of categories, where the bar height is proportional to the data ... Read More
behavioral evasion
2025-04-23
Behavioral evasion refers to techniques used to avoid detection, attribution, or identification based on behavioral patterns such as timing, command ... Read More
behavioral fingerprinting
2025-04-23
Behavioral fingerprinting or profiling is the process of identifying or profiling a user, device, or operator based on patterns in their behavior such ... Read More