For the Kernel Image and the exploit visit (

I will present the first steps I learned in the operating system kernel exploitation- Linux, what can be done, how to do it, and especially the basics that will open the kernel login gateway.This article is not about researching/exploiting weaknesses in the operating system but rather exploiting weaknesses that occur when we run in Kernel mode. In the field of binary exploitation, or know and understand the following:

Kernel Mode can run 2 types of code:

My Journey with Google Code In started 3 years ago. In my first year as a participant, I completed 7 tasks for Ubuntu. I had started too late and was unable to do more than 7 tasks. I waited a year for Google Code In 2019 and I participated in Fedora-Project. In just 2–3 Days I completed 6 tasks which gave me a confidence boost to compete further in the competition. I started communicating with the mentors in fedora who were really helpful and supportive. When the Contest ended, I had completed 27 tasks, the highest number of task for…

I have already briefed about tensorflow in my old blogs, in short it is an open-source library with is capable of running machine learning algorithms. Now lets jump to the installation part.

*Installation of Tensorflow with GPU support and anaconda*

Hardware requirements

NVIDIA GPU card with CUDA® Compute Capability 3.5 or higher, CUDA-enabled GPU cards

Software requirements

The following NVIDIA software must be installed on your system:

Nishant Parhi

Just a Geek

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store