Bilal KhanHash TablesA hash table is a data structure used to implement an associative array, a structure that can map keys to values. This kind of data…Jul 10, 2016Jul 10, 2016
Bilal KhanBypassing Simple IP Address FilteringIP filtering is simply a mechanism that decides which types of IPs will be processed normally and which will be discarded. By discarded I…Jun 21, 2016Jun 21, 2016
Bilal KhaninHackerNoon.comBeginner’s Guide to Tor on UbuntuTor is a software that enables you to hide your identity on the internet. It is an open network that helps defend against traffic analysis…Jun 20, 2016Jun 20, 2016
Bilal KhanReading Simple Captchas Using Tesseract on UbuntuIn this tutorial, I will show you how to install Google’s Open Source OCR engine Tesseract, and how simple captchas are useless in front of…Jun 14, 20164Jun 14, 20164
Bilal KhanHTTP Headers 101This tutorial is about HTTP headers and how they are useful.Jun 7, 2016Jun 7, 2016
Bilal KhanFinding a password for a protected file: The very basicsWe are going to find a password for a very simple file. If you are an advanced user, please go back and read something else. The file I…May 20, 2016May 20, 2016
Bilal KhanCreate Your Own “Neural Paintings” using Deep LearningNeural networks can work on so many things. They can interpret images, understand our voices, and translate conversations. But did you know…Apr 7, 2016Apr 7, 2016
Bilal KhanCracking a Passworded File: A Beginner’s Guide to SecuritySo here we are again, trying to find a password for another file using linux. Keeping under consideration my previous blog posts about the…Apr 4, 2016Apr 4, 2016
Bilal KhanLearning Assembly LanguageIn my previous blog post I talked about the basics of Assembly Language. Lets level up a little on our knowledge of assembly language…Mar 22, 20161Mar 22, 20161
Bilal KhanC to Assembly Language: First lookIt’s actually really interesting and helping when you have total grasp over how things really work deep down in a computer. In order to…Mar 18, 2016Mar 18, 2016