Konigsberg Bridge Problem
This article is originally a test page for a few JavaScript libraries and plugins I can use to write code to be processed as rendered graph on the client side....
Shannon Entropy and Uncertainty of Information
Shannon entropy is commonly used in malware analysis, and I actually started writing this article after an attempt to better understand Shannon entropy after reading this paper by Duc-Ly Vu...
Image Processing Convolution Kernels
As someone who’s relatively inexperienced with image processing, I started by looking at random image kernels on the web before applying it on the Matlab environment while I’m testing some...
VulnHub unknowndevice64 Writeup
This is a writeup for VulnHub’s unknowndevice64: 1 challenge. It’s been a while since I last did a VulnHub challenge, so it’s a pretty good exercise. Service Discovery I started...
Getting Certified
Background I have a bit of interest in security, since I’m quite a paranoid regarding the data I own ever since my family bought a shared Windows XP PC to...