Computer Security: Buffer Overflows and Encryption Fundamentals

Computer Security Fundamentals

Computer Security: The protection afforded to an automated information system to attain the applicable objectives of preserving the Integrity, Availability, and Confidentiality of information system resources, including hardware, software, firmware, information, data, and communication.

Buffer Overflow Vulnerabilities

Buffer overflow/overrun occurs when a process attempts to store data beyond the limits of a fixed-size buffer, overwriting adjacent memory locations. Buffers

Read More

Essential Java Interview Questions and Answers

Java Super Keyword

Question: Explain the functionality of the super keyword in Java.

Answer: The super keyword refers to the immediate parent class object. It is used to:

  • Access parent class data members hidden by child class data members.
  • Call parent class methods when overridden in the child class.
  • Invoke the parent class constructor using super().

Throw vs Throws in Java

Question: Differentiate between throw and throws keywords in Java.

Answer: throw is used inside a method or block to explicitly throw

Read More

ARM LPC1768 Embedded C Programming and Architecture

ARM LPC1768 Embedded C Programming Examples

LED Blinking Program for ARM LPC1768

#include <LPC17xx.h>

void delay() {
    for(int i=0; i<1000000; i++);
}

int main(void) {
    LPC_GPIO2->FIODIR |= (1<<0); // Set P2.0 as output
    while(1) {
        LPC_GPIO2->FIOSET = (1<<0); // LED ON
        delay();
        LPC_GPIO2->FIOCLR = (1<<0); // LED OFF
        delay();
    }
}

Switch Controlled LED Interfacing

#include <LPC17xx.h>

int main(void) {
    LPC_GPIO2-
Read More

Node.js and Express Backend Development Handbook

Express Framework Fundamentals

The Node.js web framework provides a structured pipeline from top to bottom:

  • Routing system
  • Middleware pipeline
  • Response utilities
  • Template integration (Pug, etc.)

The standard flow follows: Request → Middleware → Route → Response.

Middleware Pipeline

Middleware functions run before the final response. The function signature is (req, res, next). These functions can:

  • Modify the req or res objects.
  • Stop the request using res.send().
  • Pass control using next().

Note: If neither

Read More

Fundamental Concepts of Computing and Programming

Definition and Characteristics of a Computer

A computer is an electronic device that accepts data (input), processes it according to a set of instructions (program), stores it, and produces meaningful information (output).

What is a Computer?

A computer can be defined as: “An electronic machine that takes input, processes it under the control of a program, and produces output while storing the data for future use.”

Key Characteristics of a Computer

Computers have several important characteristics

Read More

Windows Server Administration: Essential PowerShell & Tasks

Remote PowerShell

Enter-PSSession -ComputerName AcmeDC
Exit-PSSession

Create Security Group

New-ADGroup -Name "NAME" -GroupScope Global -Path "OU=Hamilton,DC=acme,DC=com"

Create Folder and Share

  • Folder: New-Item -Path "C:\Corporate\NAME" -ItemType Directory
  • Share: New-SmbShare -Name "NAME" -Path "C:\Corporate\NAME" -FullAccess "Everyone"

NTFS Permissions (icacls)

  • Full Control: icacls "PATH" /grant "ACME\GROUP:(OI)(CI)F"
  • Modify: icacls "PATH" /grant "ACME\GROUP:(OI)(CI)M"
  • Read & Exec: icacls "PATH" /grant
Read More