Secure coding

Secure coding
Debugging your first x86 program
Learn how to debug an x86 assembly program using GDB, one of the most popular debuggers available, in the sixth article in our x86 assembly series.

Secure coding
How to build a program and execute an application entirely built in x86 assembly
Learn how to build a program and execute an application entirely built in x86 assembly in the fifth article in our x86 assembly series.

Secure coding
Overview of common x86 instructions
Get an overview of common x86 instructions and how to use them in the fourth article in our x86 assembly series.

Secure coding
x86 basics: Data representation, memory and information storage
Learn some of the fundamental concepts associated with x86 architecture in the third article in our x86 assembly series.

Secure coding
Introduction to x86 assembly and syntax
Learn what x86 assembly programs look like and the types of syntaxes programmers can use in the second article in our x86 assembly series.

Secure coding
How to mitigate Race Conditions vulnerabilities
Race condition vulnerabilities can exist when an application has multiple threads of execution that are running in parallel. This can occur either internal t

Secure coding
How to avoid Cryptography errors
In the previous articles of the series on Cryptography errors in applications, we discussed how the use of Crypto in applications can go wrong and what type

Secure coding
Cryptography errors Exploitation Case Study
In the previous articles of this series on Cryptography errors, we discussed how Cryptography is used in applications and how the use of Cryptography can go