Author: Jay

Memory Safe Programming

Ransomware can exploit memory vulnerabilities in several ways, often targeting flaws in memory management to execute malicious code or gain unauthorized access. Here are some common methods:1. Buffer Overflows: Attackers exploit vulnerabilities where a program writes more data to a buffer than it can hold, allowing them to overwrite adjacent memory and execute arbitrary code.2. […]

Would DevSecOps exist without Bitcoin?

Long ago in the time “Before the Internet” IT departments had developers that created applications and handed the code to QA testers that verified the functionality. Then the Operators put it into production and monitored it so that the help desk would not get calls from angry users. If you know what a 3270 terminal […]