목록전체 글 (110)
strangerRidingCaml
Distributed Systems Client-server architecture In a client-server architecture, clients request services or resources from servers, which fulfill these requests. This model enables scalable and efficient distribution of resources across a network. Communication protocols (TCP/IP, RPC) TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of communication protocols used ..
Virtualization Virtual machines vs. containers Virtual machines (VMs) emulate a complete hardware environment, allowing the execution of multiple operating systems on a single physical machine. Containers virtualize the operating system environment rather than emulating hardware, sharing the host operating system's kernel and resources. Hypervisors and virtualization techniques Hyper..
Kernel Architecture Monolithic vs. microkernel architectures A monolithic kernel architecture integrates all operating system services, including device drivers, file system management, and memory management, into a single address space running in privileged mode. It offers high performance due to direct access to hardware resources but exhibits less modularity and fault isolation. A mi..
Introduction to Advanced Operating SystemsOverview of operating system design principlesAn operating system (OS) is a fundamental software layer that manages computer hardware resources and provides services to user applications.Operating system design principles encompass fundamental concepts and methodologies guiding the development of efficient, reliable, secure, and scalable operating system..
Advanced Browser Exploitation Techniques Lecture: Understanding client-side vulnerabilities and browser-specific attack vectors. : This lecture will delve into advanced browser exploitation techniques, focusing on sophisticated attack vectors such as browser fingerprinting, sandbox escape, and exploit chaining. Browser fingerprinting involves the identification of un..
Client-Side Attacks Lecture: Understanding client-side vulnerabilities and browser-specific attack vectors. : This lecture will cover various client-side vulnerabilities and browser-specific attack vectors commonly exploited by attackers. Client-side vulnerabilities occur when malicious code is executed on the user's device, often through web browsers, plugins, or other application..