The Portable Executable (PE) format is a file format for executables, object code, DLLS, and others used in Windows operating systems. The structure of a PE file includes several headers, each serving a specific purpose.
Understanding those are crucial for reverse engineering, debugging, and malware...
A proxy acts as an intermediary between a client and a server, it’s very often used for filtering, caching, and logging web requests.
Types
Forward Proxy - Used by clients to access the internet, it hides the client’s IP address. E.g. Filtering employee internet traffic.
Reverse Proxy...
Tokenization is a data security technique where data is replaced by non-sensitive equivalents, called tokens. These tokens can be used in the system without exposing the sensitive data.
Where is Tokenization Used?
This is commonly used in sectors handling sensitive information such as finance, healthcare and...