VDVishesh Dutt Sharmainsttudv.hashnode.dev00The Shape of an ATT&CK5d ago · 5 min read · There is a certain way security incidents are often described. A system was “breached.” An account was “compromised.” Data was “exfiltrated.” The language is compact, almost compressed, as if a sequenJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00What an Image Is Allowed to HideMar 22 · 7 min read · You are looking at an image. Perhaps it is a meme. Perhaps it is a cat. These categories, as experience suggests, are not mutually exclusive. The image appears continuous—smooth gradients, coherent shJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00POV: You Double-Clicked an EXEMar 15 · 7 min read · Abstract Launching a program in Microsoft Windows appears deceptively simple. A user double-clicks an executable file and the program starts almost instantly. Beneath that simple action, however, WindJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00How C happened?Mar 8 · 7 min read · Abstract The C programming language is one of the most influential technologies in computing history. Designed in the early 1970s at Bell Labs by Dennis M. Ritchie, it became the foundation for operatJoin discussion
VDVishesh Dutt Sharmainsttudv.hashnode.dev00The Language Beneath the CodeMar 1 · 6 min read · Introduction This post documents my key technical takeaways from reading Code: The Hidden Language of Computer Hardware and Software by Charles Petzold. Rather than treating computers as abstract blacJoin discussion