continue…
Related to
Understanding buffer overflow exploitation
Network Hijacking
55 min
C Optimizations for the masses
50 min
Revisiting "Trusting Trust" for binary toolchains
60 min