The Aceman Cometh | ||||||||||||||||||||||||
Conspiracy Weekly | ||||||||||||||||||||||||
Has life got you down? Is that deadline at work closing in fast? Do you have iron-poor blood? Perhaps your sex life isn't quite as "spicy" as you'd like it to be. Whatever your silly little problems are, you can now rest easy knowing that The Aceman has started writing to his loyal viewers each and every week (or whenever the hell I get around to it). By placing yourself on my mailing list, you can be assured that you will be further exposed to the inner-workings of the complex mind that comprises Acemans dwelling, which will in turn provide you with the insight necessary to unlock the many mysteries of the free world as we know it. | ||||||||||||||||||||||||
Digress, not! Forward Progress is our only concern | ||||||||||||||||||||||||
Weekly breakdwon of hacking terms and what their uses are. Exploits are snippets of code, usually in C or shell scripts, used to take advantage of a flaw in a program to open a security hole. The most common type is the buffer overflow, which basically involves throwing a lot of garbage into a program's memory buffer until it crashes, subsequently executing the code your exploit left on the stack. To understand this concept better, I recommend reading Smashing the Stack for Fun and Profit. Exploits have tremendous informational value: besides being excellent real-world examples of programming, they help developers patch holes and also heighten security awareness. | ||||||||||||||||||||||||
Prepare for the Real Conspiracy theory Newsletter | ||||||||||||||||||||||||
| So go ahead... sign up now and prepare yourselves for total consciousness and splendid enlightenment. But please do take a moment to peruse my site before you do. I don't want to remove your sorry ass from my list because you were too dopey to check out what you were signing up for.
|
Favourite links
|
|
|
This page has been visited times. |