Presentation for Roadshow of Cyber Security Marathon 2018
Mozilla Community Space
Jakarta, 2018-01-20
How many of you know firmware?
Then how many of you know that firmware can be reversed?
Let's see how can we do that.
CS266 Software Reverse Engineering (SRE)
Introduction to Software Reverse Engineering
Teodoro (Ted) Cipresso, [email protected]
Department of Computer Science
San José State University
Spring 2015
CS266 Software Reverse Engineering (SRE)Reversing and Patching Wintel Machine Code
Teodoro (Ted) Cipresso, [email protected]
Department of Computer Science
San José State University
Spring 2015
Software Reverse Engineering in a Security ContextLokendra Rawat
Software Reverse Engineering in a Security Context (ncrisc 2018) this research paper was proposed in university event and it's targeted audience was junior students and anyone who doesn't have a clue on reverse engineering , also useful for developers because this will help them to understand execution of their developed applications on low level and malicious person able to exploit their applications
This document summarizes key aspects of system and software development including common roles, the development lifecycle, and common program design models. It discusses the roles of systems analysts and stakeholders, outlines typical phases of analysis, design, implementation, and testing, and describes waterfall and agile development models as well as cowboy coding.
Software Reverse Engineering in a Security Context (ncrisc 2018)Lokendra Rawat
https://drive.google.com/open?id=152zyh8NsPD3razOdgm5AY4QTzHTHTPCJ
NCRISC (2nd National Conference on Recent innovation in Software and Computer 2018)
Introduction and importance of reverse engineering in security related issues with the help of examples and exploit development references and learning resources for beginners.
This document provides an overview of what a backend engineer is and the key skills required for the role. It defines a backend engineer as a software engineer who applies principles of software engineering to design, develop, maintain, test and evaluate server-side software. The document outlines important backend-related skills like backend programming languages, databases, algorithms and data structures. It also lists some non-backend skills such as version control, workflow and effective communication.
Reverse Engineering - Protecting and Breaking the SoftwareSatria Ady Pradana
First upload.
Introduction to reverse engineering. The focus of this presentation is software or code, emphasizing on common practice in reverse engineering of software
Reverse Engineering: Protecting and Breaking the SoftwareSatria Ady Pradana
Presentation on Let's Secure Your Code
Universitas Muhammadiyah Surakarta
Surakarta, 2017-05-01
Introduction to Reverse Engineering.
This presentation is focusing on software or code, emphasizing on common practice in reverse engineering of software.
(Workshop) Reverse Engineering - Protecting and Breaking the SoftwareSatria Ady Pradana
The document discusses reverse engineering principles and techniques. It introduces reverse engineering as breaking down an existing system to understand its construction and components. The three fundamental principles are comprehension, decomposition, and reconstruction. Common reverse engineering practices are described like resource modification, control flow bypass, and code caving. Hands-on examples are provided using a CrackMe program in C# to demonstrate reverse engineering a .NET binary, including modifying strings, bypassing checks, changing function targets, and injecting custom code.
Reverse Engineering: Protecting and Breaking the Software (Workshop)Satria Ady Pradana
Workshop on Let's Secure Your Code
Universitas Muhammadiyah Surakarta
Surakarta, 2017-05-02
This workshop is a small introductory to Reverse Engineering, with C# and CIL as focus.
The crackme: https://pastebin.com/AS8NEtLc
The challenge: https://pastebin.com/Tb0MutfK
Reengineering including reverse & forward EngineeringMuhammad Chaudhry
The document discusses forward engineering and reverse engineering. Reverse engineering involves extracting design information from source code through activities like data and processing analysis. This helps understand the internal structure and functionality. Forward engineering applies modern principles to redevelop existing applications, extending their capabilities. It may involve migrating applications to new architectures like client-server or object-oriented models. Reverse engineering provides critical information for both maintenance and reengineering existing software.
Building Large Scale PHP Web Applications with Laravel 4Darwin Biler
Learn how Laravel 4 can be leveraged to its fullest by making use of its powerful design patterns, specifically IoC Container and Dependency Injection.
Reengineering involves improving existing software or business processes by making them more efficient, effective and adaptable to current business needs. It is an iterative process that involves reverse engineering the existing system, redesigning problematic areas, and forward engineering changes by implementing a redesigned prototype and refining it based on feedback. The goal is to create a system with improved functionality, performance, maintainability and alignment with current business goals and technologies.
The document describes a practical training project to develop a job portal website using PHP at Masters Infosoft Pvt. Ltd. in Jaipur, India by Arjun lal Kumawat, a student at Sobhasaria Engineering College. It discusses the objectives, scope, system analysis and design, hardware and software requirements, data flow diagram, and testing of the job portal website project.
This document discusses fundamentals of software engineering design. It explains that design creates a representation of software that provides implementation details beyond an analysis model. Four design models are described: data design, architectural design, user interface design, and component-level design. Design principles, concepts like abstraction and patterns are explained. Tools like CASE tools can support design, and evaluation ensures a quality design. A design specification document formally specifies the design.
The document discusses the goals and challenges of software engineering. It notes that the goals of producing software that is correct, with minimal effort and cost, and in the least time are difficult to fully achieve. Large software involves many people and millions of dollars over many years. Real-life examples like Eclipse have over 1.35 million lines of code and cost over $54 million to develop. The document outlines why software engineering is important to avoid costly failures and ensure efficient development. It also discusses myths and the need for different approaches like formal processes for large software.
The document discusses reverse engineering and provides three key points:
1. Reverse engineering is the process of analyzing a subject system to understand how it works and create representations at higher levels of abstraction, in order to facilitate tasks like software maintenance and migration.
2. The goals of reverse engineering include recovering lost information and documentation, assisting with maintenance, and enabling software reuse. It allows understanding an existing system without access to the original source code or design documents.
3. Reverse engineering approaches include restructuring, re-documentation, re-engineering, and abstraction recovery. Program understanding is the most important part of reverse engineering, and discovery of abstractions in large complex systems is a key challenge.
Hibernate training at HarshithaTechnologySolutions @ NizampetJayarajus
HTS is a professionally managed IT Software Development and Consulting company offering services in the area of Software Development, Software Integration, Web Solutions, Outsourcing Services, Technical Staff Augmentation. Our business approach models provide our clients the highest quality services at significantly reduced costs.
<a />Hibernate</a>
Hibernate weekends Training is an Object-Relational Mapping (ORM) solution for JAVA and it raised as an open source persistent framework created by Gavin King in 2001. Hibernate weekends Training is a powerful, high performance Object-Relational Persistence and Query service for any Java Application. Hibernate Training maps Java classes to database tables and from Java data types to SQL data types and relieve the developer from 95% of common data persistence related programming tasks. Hibernate sits between traditional Java objects and database server to handle all the work in persisting those objects based on the appropriate O/R mechanisms and patterns.
Checkout for schedules
Contact Us:
Flat No: 2A, 2B, Livingston Estate,
Beside Andhra Bank, NIzampet Main Road, Hyderabad-85.
Phone: +91-40-42020378.
[email protected]
This document summarizes 10 ways to improve code based on a presentation by Neal Ford. The techniques discussed include composing methods to perform single tasks, test-driven development to design through tests, using static analysis tools to find bugs, avoiding singletons, applying the YAGNI principle to only build what is needed, questioning conventions, embracing polyglot programming, learning Java nuances, enforcing the single level of abstraction principle, and considering "anti-objects" that go against object-oriented design. Questions from the audience are then addressed.
The document discusses various phases of the software development life cycle (SDLC) including analysis, design, coding, and testing.
In the analysis phase, it discusses software requirements specifications, business analysts, and their roles in initiating projects, elaborating details, and supporting implementation.
The design phase covers use case diagrams, data flow diagrams, sequence diagrams, and class diagrams. It provides examples of how to draw and use each type of diagram.
Coding involves programming languages like Java. Testing discusses the JUnit testing framework and Selenium, an open source web testing tool, covering their features and why Selenium is commonly used for automated testing.
The document discusses various phases of the software development life cycle (SDLC) including analysis, design, coding, and testing.
In the analysis phase, it discusses software requirements specifications, business analysts, and their roles in initiating projects, elaborating details, and supporting implementation.
The design phase covers use case diagrams, data flow diagrams, sequence diagrams, and class diagrams. It provides examples of how to draw and use each type of diagram.
Coding involves programming languages like Java. Testing discusses the JUnit testing framework and Selenium, an open source web testing tool, covering their features and why Selenium is commonly used for automated testing.
The document provides instructions for downloading, installing, and using the IDA Pro disassembler software. It explains that IDA Pro can be downloaded from Hex-Rays' website as a demo or evaluation version. The installation process involves agreeing to the
Simon Brown: Software Architecture as Code at I T.A.K.E. Unconference 2015Mozaic Works
This document discusses software architecture and how it relates to code. It suggests that software architecture should be more accessible to developers and embodied in the code through architecturally evident coding styles. Components can be extracted from code if naming conventions, packaging, and other patterns are used. Both diagrams and code should reflect the architectural abstractions. Software architecture models can be maintained as code to keep them in sync with implementation changes.
This document discusses 10 ways to improve programming code through practices like composing methods, test-driven development, static analysis, and questioning assumptions. It encourages techniques like short single-purpose methods, writing tests before code, using tools like FindBugs, avoiding unnecessary complexity, and continually learning language nuances. Examples show refactoring code to follow these practices. Resources are provided on related topics like pair programming and anti-object-oriented design.
Framework design involves balancing many considerations, such as:
- Managing dependencies between components to allow for flexibility and evolution over time. Techniques like dependency injection and layering help achieve this.
- Designing APIs by first writing code samples for key scenarios and defining object models to support these samples to ensure usability.
- Treating simplicity as a feature by removing unnecessary requirements and reusing existing concepts where possible.
Designing Malware for Modern Red Team and Adversary Tradecraft.
Why using python for building malware?
Lesson learn and consideration.
as presented in PyCon ID 2021 (05/12/2021)
Reverse Engineering - Protecting and Breaking the SoftwareSatria Ady Pradana
First upload.
Introduction to reverse engineering. The focus of this presentation is software or code, emphasizing on common practice in reverse engineering of software
Reverse Engineering: Protecting and Breaking the SoftwareSatria Ady Pradana
Presentation on Let's Secure Your Code
Universitas Muhammadiyah Surakarta
Surakarta, 2017-05-01
Introduction to Reverse Engineering.
This presentation is focusing on software or code, emphasizing on common practice in reverse engineering of software.
(Workshop) Reverse Engineering - Protecting and Breaking the SoftwareSatria Ady Pradana
The document discusses reverse engineering principles and techniques. It introduces reverse engineering as breaking down an existing system to understand its construction and components. The three fundamental principles are comprehension, decomposition, and reconstruction. Common reverse engineering practices are described like resource modification, control flow bypass, and code caving. Hands-on examples are provided using a CrackMe program in C# to demonstrate reverse engineering a .NET binary, including modifying strings, bypassing checks, changing function targets, and injecting custom code.
Reverse Engineering: Protecting and Breaking the Software (Workshop)Satria Ady Pradana
Workshop on Let's Secure Your Code
Universitas Muhammadiyah Surakarta
Surakarta, 2017-05-02
This workshop is a small introductory to Reverse Engineering, with C# and CIL as focus.
The crackme: https://pastebin.com/AS8NEtLc
The challenge: https://pastebin.com/Tb0MutfK
Reengineering including reverse & forward EngineeringMuhammad Chaudhry
The document discusses forward engineering and reverse engineering. Reverse engineering involves extracting design information from source code through activities like data and processing analysis. This helps understand the internal structure and functionality. Forward engineering applies modern principles to redevelop existing applications, extending their capabilities. It may involve migrating applications to new architectures like client-server or object-oriented models. Reverse engineering provides critical information for both maintenance and reengineering existing software.
Building Large Scale PHP Web Applications with Laravel 4Darwin Biler
Learn how Laravel 4 can be leveraged to its fullest by making use of its powerful design patterns, specifically IoC Container and Dependency Injection.
Reengineering involves improving existing software or business processes by making them more efficient, effective and adaptable to current business needs. It is an iterative process that involves reverse engineering the existing system, redesigning problematic areas, and forward engineering changes by implementing a redesigned prototype and refining it based on feedback. The goal is to create a system with improved functionality, performance, maintainability and alignment with current business goals and technologies.
The document describes a practical training project to develop a job portal website using PHP at Masters Infosoft Pvt. Ltd. in Jaipur, India by Arjun lal Kumawat, a student at Sobhasaria Engineering College. It discusses the objectives, scope, system analysis and design, hardware and software requirements, data flow diagram, and testing of the job portal website project.
This document discusses fundamentals of software engineering design. It explains that design creates a representation of software that provides implementation details beyond an analysis model. Four design models are described: data design, architectural design, user interface design, and component-level design. Design principles, concepts like abstraction and patterns are explained. Tools like CASE tools can support design, and evaluation ensures a quality design. A design specification document formally specifies the design.
The document discusses the goals and challenges of software engineering. It notes that the goals of producing software that is correct, with minimal effort and cost, and in the least time are difficult to fully achieve. Large software involves many people and millions of dollars over many years. Real-life examples like Eclipse have over 1.35 million lines of code and cost over $54 million to develop. The document outlines why software engineering is important to avoid costly failures and ensure efficient development. It also discusses myths and the need for different approaches like formal processes for large software.
The document discusses reverse engineering and provides three key points:
1. Reverse engineering is the process of analyzing a subject system to understand how it works and create representations at higher levels of abstraction, in order to facilitate tasks like software maintenance and migration.
2. The goals of reverse engineering include recovering lost information and documentation, assisting with maintenance, and enabling software reuse. It allows understanding an existing system without access to the original source code or design documents.
3. Reverse engineering approaches include restructuring, re-documentation, re-engineering, and abstraction recovery. Program understanding is the most important part of reverse engineering, and discovery of abstractions in large complex systems is a key challenge.
Hibernate training at HarshithaTechnologySolutions @ NizampetJayarajus
HTS is a professionally managed IT Software Development and Consulting company offering services in the area of Software Development, Software Integration, Web Solutions, Outsourcing Services, Technical Staff Augmentation. Our business approach models provide our clients the highest quality services at significantly reduced costs.
<a />Hibernate</a>
Hibernate weekends Training is an Object-Relational Mapping (ORM) solution for JAVA and it raised as an open source persistent framework created by Gavin King in 2001. Hibernate weekends Training is a powerful, high performance Object-Relational Persistence and Query service for any Java Application. Hibernate Training maps Java classes to database tables and from Java data types to SQL data types and relieve the developer from 95% of common data persistence related programming tasks. Hibernate sits between traditional Java objects and database server to handle all the work in persisting those objects based on the appropriate O/R mechanisms and patterns.
Checkout for schedules
Contact Us:
Flat No: 2A, 2B, Livingston Estate,
Beside Andhra Bank, NIzampet Main Road, Hyderabad-85.
Phone: +91-40-42020378.
[email protected]
This document summarizes 10 ways to improve code based on a presentation by Neal Ford. The techniques discussed include composing methods to perform single tasks, test-driven development to design through tests, using static analysis tools to find bugs, avoiding singletons, applying the YAGNI principle to only build what is needed, questioning conventions, embracing polyglot programming, learning Java nuances, enforcing the single level of abstraction principle, and considering "anti-objects" that go against object-oriented design. Questions from the audience are then addressed.
The document discusses various phases of the software development life cycle (SDLC) including analysis, design, coding, and testing.
In the analysis phase, it discusses software requirements specifications, business analysts, and their roles in initiating projects, elaborating details, and supporting implementation.
The design phase covers use case diagrams, data flow diagrams, sequence diagrams, and class diagrams. It provides examples of how to draw and use each type of diagram.
Coding involves programming languages like Java. Testing discusses the JUnit testing framework and Selenium, an open source web testing tool, covering their features and why Selenium is commonly used for automated testing.
The document discusses various phases of the software development life cycle (SDLC) including analysis, design, coding, and testing.
In the analysis phase, it discusses software requirements specifications, business analysts, and their roles in initiating projects, elaborating details, and supporting implementation.
The design phase covers use case diagrams, data flow diagrams, sequence diagrams, and class diagrams. It provides examples of how to draw and use each type of diagram.
Coding involves programming languages like Java. Testing discusses the JUnit testing framework and Selenium, an open source web testing tool, covering their features and why Selenium is commonly used for automated testing.
The document provides instructions for downloading, installing, and using the IDA Pro disassembler software. It explains that IDA Pro can be downloaded from Hex-Rays' website as a demo or evaluation version. The installation process involves agreeing to the
Simon Brown: Software Architecture as Code at I T.A.K.E. Unconference 2015Mozaic Works
This document discusses software architecture and how it relates to code. It suggests that software architecture should be more accessible to developers and embodied in the code through architecturally evident coding styles. Components can be extracted from code if naming conventions, packaging, and other patterns are used. Both diagrams and code should reflect the architectural abstractions. Software architecture models can be maintained as code to keep them in sync with implementation changes.
This document discusses 10 ways to improve programming code through practices like composing methods, test-driven development, static analysis, and questioning assumptions. It encourages techniques like short single-purpose methods, writing tests before code, using tools like FindBugs, avoiding unnecessary complexity, and continually learning language nuances. Examples show refactoring code to follow these practices. Resources are provided on related topics like pair programming and anti-object-oriented design.
Framework design involves balancing many considerations, such as:
- Managing dependencies between components to allow for flexibility and evolution over time. Techniques like dependency injection and layering help achieve this.
- Designing APIs by first writing code samples for key scenarios and defining object models to support these samples to ensure usability.
- Treating simplicity as a feature by removing unnecessary requirements and reusing existing concepts where possible.
Designing Malware for Modern Red Team and Adversary Tradecraft.
Why using python for building malware?
Lesson learn and consideration.
as presented in PyCon ID 2021 (05/12/2021)
Man in the Middle, classic but still relevant.
What is MITM? How to achieve it? What impact it have?
Find out MITM in this presentation (Jakarta, 25/07/2020)
This document discusses cyber security careers in Indonesia. It provides an overview of common cyber security jobs including penetration tester, security engineer, SOC engineer, and forensic investigator. It also outlines the skills needed to work in cyber security, challenges in the field in Indonesia like a lack of professionals, and ways to prepare like building skills through virtual labs, capture the flag challenges, and communities. Daily activities of a penetration tester are also summarized as finding vulnerabilities, creating proof of concepts, writing reports, and presenting results.
small talk about IOT security especially IOT pentesting for beginner. What exactly IOT and how we test it?
Live on Ethical Hacker Indonesia
April 14th 2020
Slide yang kupresentasikan di PyCon 2019 (Surabaya, 23/11/2019)
Red-Teaming is a simulation of real world hacking against organization. It has little to no limit of time, location, and method to attack. Only results matter. This talk gives insight about how “hacker” works and how python can be used for sophisticated series of attack.
This document discusses security issues related to the Internet of Things (IoT). It begins with an introduction to IoT, noting the exponential growth in connected devices. It then outlines common threats to IoT systems, including attacks aimed at devices, networks, and cloud infrastructure. Specific examples like the Mirai botnet and attacks on Ukrainian power grids are examined. The presentation concludes with recommendations for improving IoT security, such as understanding system architectures, implementing policies, and regularly monitoring networks.
This 5-day course teaches reverse engineering and malware analysis skills. It covers analyzing Windows and Linux binaries to understand program flow and perform static and dynamic analysis. Topics include disassembly, decompilation, debugging, instrumentation, and patching code. The course is intended for reverse engineers, malware analysts, security engineers, incident responders, and security professionals who need to analyze and modify binaries to securely defend against evolving threats.
Modern software applications are complex and connected systems that process, store, and transmit data. This complexity introduces many potential attack vectors if proper security practices are not followed. Common attacks include injection attacks by inserting malicious code into inputs, insecure direct object reference issues that allow unauthorized access to restricted resources, and exposing sensitive information if debugging artifacts or unobfuscated binaries are deployed. To mitigate these risks, developers must filter all inputs, carefully check authorization for resources, and ensure no secrets or development files are included in production deployments.
The Offensive Python: Practical Python for Penetration TestingSatria Ady Pradana
Presentation for Roadshow of Cyber Security Marathon 2018
Code Margonda
Depok, 2018-01-11
So you got python? How far can you push your python?
Why would hackers love python?
It's not hard to know that python is amazing language. But how amazing it could be for cyber security? Let's see by getting our hands dirty, from simple tasks to more challenging action
From Reversing to Exploitation: Android Application Security in EssenceSatria Ady Pradana
This document discusses techniques for analyzing and exploiting Android applications. It begins by explaining why security is important given people's growing dependency on digital technology and mobile devices. It then discusses decompiling APK files and using tools like Apktool, Dex2Jar, and decompilers to view an app's code. The document also covers using proxies like Burp Suite and Frida to intercept network traffic and manipulate app behavior at runtime. The goal is usually to obtain sensitive data, bypass restrictions, or modify the app. Examples of scenarios explored include tampering with network requests, bypassing security checks, and decrypting encrypted data.
Presentation on Technostar 2017
STMIK Jakarta STI&K
Jakarta, 2017-10-10
General overview of android security from hacker's perspective. Android security mostly seen as only "exploiting the device with RAT" and some of it. Here, I want to show that there are more than that.
Small discussion on Echo's Hack In The Zoo (HITZ) 2017
Ragunan Zoo Jakarta
Jakarta, 2017-09-09
Frida? It's a Dynamic Binary Instrumentation. DBI.
Let's see what frida can do for us, reverse engineer.
Malware comes in many forms and poses increasing threats. The document discusses the basics of how malware works, including propagation techniques to spread, payloads to damage systems, and self-defense mechanisms. It also covers common malware classes like viruses, worms and Trojans. Examples are given of real malware outbreaks like WannaCry and Petya to show how quickly they can spread. Defense strategies include using antivirus software, keeping systems updated, and maintaining backups.
Memory Forensic: Investigating Memory Artefact (Workshop)Satria Ady Pradana
Workshop of memory forensic
Atmajaya University
Yogyakarta, 2017-04-29
What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic?
This is the workshop side with hands-on material.
Presentation of memory forensic
Atmajaya University
Yogyakarta, 2017-04-29
What is memory forensic? How could it be important? How can we use memory forensic in certain case? Should we do memory forensic?
Presentation on STMIK Nusa Mandiri.
Jakarta, 2017-04-25
This talk is an insight about hacking and cyber security in general. Giving the audience the sense of security and fundamental concept of this field.
Presentasi di ID Cert Malware Summit 2017
Bandung, 2017-04-13
Presentasi ini terdiri dari beberapa slide yang membahas subtopik presentasi. Narasi dan penjelasan ada pada notes di setiap slide.
This document outlines an agenda for a web security workshop. It introduces the presenter, Satria Ady Pradana, and mentions that he will discuss the Dracos Linux penetration testing operating system. The workshop will cover installing and using Dracos Linux in a virtual machine, including configuring the network, installing packages, and using its user interface. Attendees will have the opportunity to try SQL injection, cross-site scripting, and cross-site request forgery attacks on a target website.
Workshop on Mobile Forensic and Computer Security 2017
Universitas Ahmad Dahlan
Yogyakarta, 2017-02-17
dracOs is a linux distro for cyber security activity. But most of us know cyber security as offensive activity. How about digital forensic?
Here we are discussing about dracOs and masterplan for digital forensic in future release.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Semantic Cultivators : The Critical Future Role to Enable AIartmondano
By 2026, AI agents will consume 10x more enterprise data than humans, but with none of the contextual understanding that prevents catastrophic misinterpretations.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
2. Hi!
I am Satria Ady Pradana
Community Leader
of
Reversing.ID
xathrya
@xathrya
Reversing.ID
Revealing the Truth through Breaking Things
https://xathrya.id
3. Disclaimer
This presentation is intended for educational purposes only.
Reverse engineering of copyrighted material is illegal an might
cause you a direct or indirect consequence. We have no
responsibility of anything you do after learning this.
5. Explaining Reversing
Originally used in the context of mechanical engineering
Breaks down an existing object or system to its construction
and then rebuild it based on new demand.
Extracting knowledge or design information from anything man-
made and reproducing it or reproduce anything based on the
extracted information.
12. Control Flow Bypass
Alter program flow
Force program to takes (or leaves) intended action.
Jump over the protection mechanism
13. Code Caving
Writing code to specific region of application (or process’
memory)
Fast and easy
No need for source
In conjunction of Function Trampoline.
15. The Language
Depend on the target of reversing.
Each programming languages might have unique trait or
characteristic.
Channel in Go
Two classes of programming language: native, interpreted.
16. Assembly
Primitive of Processors operations
Complex operation is decomposed to various instructions
Constrained by processors’ architecture
17. The Executable Format
Application has a format.
Identify by magic number.
Structured and has some sections for data, code, resource, etc.
Function might be provided by foreign module (ex: DLL), list of
imported function is maintained.
20. Design Pattern
Software is divided into conceptual module and working
together.
Repeatable solution to a commonly occurring problem in a
software design.
24. Hex Editor
Display the content of file as collection of hex formatted-data and modify
part of them.
Find pattern and occurrence.
26. Disassembler
Transform stream of hex bytes to its assembly representation.
Resolve data and resource, referred by the code.
28. Debugger
Test or debug other (target) program
Examine program condition at runtime.
Modify code or data section.
Modify CPU state
Alter control flow