# Category Security

# Faceboom

You may or may not have heard from the ‘Slashdot effect’[0].

# Kernel Exploitation Part Six

This post is the sixth and last part of my notes from the lecture about kernel exploitation of pwn.

# Kernel Exploitation Part Five

This post is the five part of my notes from the lecture about kernel exploitation of pwn.

# Kernel Exploitation Part Four

This post is the fourth part of my notes from the lecture about kernel exploitation of pwn.

# Kernel Exploitation Part Three

This post is the third part of my notes from the lecture about kernel exploitation of pwn.

# Kernel Exploitation Part Two

This is the secound part of my notes from the lecture about kernel exploitation of pwn.

# Kernel Exploitation Part One

This post reflects my notes and additional thoughts about the first lecture about kernel exploitation of pwn.

# Kernel Exploitation Sidenotes

Because I already knew a bit of hardware-related operation and you often find code statements like the following:

# Kernel Exploitation Intro

One of my plans was to learn about security[0]. My ToDo list is massively full of different topics I want to put some attention on.

# Generic Software is an attack avenue

As you may or may not know, one quite big hack went through the media lately, Solar Wind[0][1].