Chamath DenuwanaWhat’s QEMUQEMU (Quick Emulator) is a free and open-source machine emulator and virtualizer that can run various guest operating systems and…Oct 23, 2023Oct 23, 2023
Chamath DenuwanaCode obfuscation is a valuable tool in the arsenal of software developers, helping protect their…Code obfuscation is a technique used by software developers to make software code more difficult to understand and analyze to unauthorized…Sep 17, 2023Sep 17, 2023
Chamath DenuwanaPhishing attack: Capturing mobile PIN codes(Windows,Android and Iphones) over httpsIn the realm of cybersecurity, the cat-and-mouse game between malicious actors and security professionals is a constant battle. As…Sep 4, 2023Sep 4, 2023
Chamath DenuwanaFile inclusion vulnerabilityFile inclusion vulnerability is a security flaw found in web applications that allows an attacker to include arbitrary files on a target…Jul 23, 2023Jul 23, 2023
Chamath DenuwanaBuffer Overflow Vulnerabilities attackBuffer overflows are one of the most common and dangerous computer security vulnerabilities that occur when a program or system allows more…Jun 3, 2023Jun 3, 2023