🐉 neospace ~

        • Man-in-the-Middle Attack MITM
        • Monoalphabetic Substitution Cipher - A Detailed Explanation
        • XSS vs HTML
          • 🔗 Computer Architecture - CYBVU 23.2
          • Computer Organization
          • Introduction to Computer Architecture
          • 🔗 Data Communications and Networks
          • Lecture 1 - Introduction
          • Lecture 2 - Email Services
          • Lecture 3 - Data and Signals
          • Lecture 4 - Communication Medium
          • Lecture 5 - Wireless Medium
          • 🔗 Java - CYBVU 23.2
          • 22 Aug Lecture Note
          • 30th Aug Assignment Submission
          • Arithmetic Expressions
          • Data Types
          • Hello World, Escape Sequences, Comments
          • Introduction to Java
          • Java Full RECAP
          • String args
          • User input (Scanner)
          • Variables
          • 🔗 Operating Systems
          • Introduction to Operating Systems
          • Lec 2 Process Management
          • Lec 3 Process Control Management
          • Lec 4 Memory Management
          • Lec 5 Virtual Memory Management
          • 🔗 Web Application Development - CYBVU 23.2
          • All CSS Concepts at once (module related)
          • Client-Server Model
          • Essential JavaScript Concepts for This Module Pt.1
          • HTTP vs HTTPS
          • Introduction to HTML Part A
          • Introduction to HTML Part B
          • JavaScript Form Validation Pt. 3
          • JavaScript Pt. 2
          • PHP Pt. 1
          • PHP Pt. 2
          • Static vs Dynamic Pages
          • Website vs WebApp
          • What is the INTERNET?
          • World Wide Web (WWW)
        • Spring 24' Y1S2
          • 🔗 NIT2201 Profession and ethic
          • Week 2 - Security, Privacy & Ethics
          • Week 2 Tutorial 02 NIT2201
          • Week 3 Tutorial 03 NIT2201
          • 🔗(NIT2242) Data privacy and cyber physical systems security - 7K
          • Week 1 - Introduction to the Module
          • Week 2 - Cyber Physical Systems
          • 🔗 Cybersec Essentials
          • Lab 1 CSES
          • Lab 2 CSES
          • Lab 3 CSES
          • Lab 4 CSES
          • Lab 5 CSES
          • Lab 6 CSES
          • Lab 7 CSES
          • Lab 8 CSES
          • Week 1 - Introduction to Security
          • Week 2 - Malware and Social Engineering Attacks
          • Week 3 - Application and Networking-Based Attacks
          • Week 4 - Cryptography
          • Week 5 - Cryptography Part-II
          • Week 6 - PKI and Steganography
          • Week 7 - Network Security Fundamentals
          • Week 8 - Administering a Secure Network
          • 🔗 Server Administration and Management
          • Lab 1 SAAM
          • Lab 3 SAAM
          • Presentation Case Study
          • SAAM Summarise
          • Week 1 Introduction to Windows Server
          • 🔗 Digital Forensics and Ethical Hacking
          • Lab 1 DFEH
          • Lab 2 DFEH
          • Lab 3 DFEH
          • Lab 4 DFEH
          • Lab 6 DFEH
          • Lab 7 DFEH
          • Lab 8 DFEH
          • Lab 9 DFEH
          • Lab 10 DFEH
          • Research About Hashing
          • Untitled
          • Week 1 - Intro to Digital Forensics and its Processes
          • Week 1 DFEH Before Class Activities
          • Week 2 - Computer Forensics
          • Week 3 - Mobile Forensics
          • Week 3 DFEH Before Class
          • Week 5 - Investigative Reports and Legal Acceptance
          • XYZ School Investigation
          • 🔗 Introduction to Ict Management
          • NIT2171 ICT Management Test 1
          • Week 1 - ICT trends and challengers
        • Winter 24' Y2S1
      • CodeSprint X WorkShop 1
      • Drawing 2024-08-28 03.41.15.excalidraw
      • Drawing 2024-10-28 23.43.44.excalidraw
      • Drawing 2024-11-15 04.16.45.excalidraw
      • Drawing 2025-01-16 17.14.38_0.excalidraw
      • Drawing 2025-01-20 02.41.36.excalidraw
      • Drawing 2025-01-21 13.19.31.excalidraw
      • Drawing 2025-01-21 22.40.14.excalidraw
      • Drawing 2025-01-23 15.43.32.excalidraw
      • Drawing 2025-02-06 12.06.44.excalidraw
      • Drawing 2025-02-06 12.27.58.excalidraw
      • Drawing 2025-02-14 20.57.33.excalidraw
      • Drawing 2025-02-19 04.06.05.excalidraw
      • Drawing 2025-02-24 10.48.03.excalidraw
      • Drawing 2025-02-24 22.40.51.excalidraw
      • Drawing 2025-05-16 21.03.20.excalidraw
      • Drawing 2025-05-22 09.54.57.excalidraw
      • Inotroduction to Java 2024-08-20 15.15.43.excalidraw
      • Inotroduction to Java 2024-08-21 00.54.38.excalidraw
      • Inotroduction to Java 2024-08-21 01.02.20.excalidraw
      • Template.excalidraw
              • 🔗 How Ai Works
              • Prediction and probability
                • 🔗 Module 1 Foundations of Cybersecurity
                • Common CyberSec Terminology
                • Core skills for cybersec professionals
                • Course 1 Overview
                • Google Cybersecurity Certificate Overview
                • Helpful resources and tips
                • Importance of CyberSecurity
                • Introduction to Cybersecurity
                • My Path to CyberSecurity
                • Nikki A day in the life of a security engineer
                • Responsibilities of an entry-level cybersecurity analyst
                • Transferable and technical cybersecurity skills
                • Veronica My path to working in cybersecurity
                • Welcome to the Google Cybersecurity Certificate
                • Wrap-up Module 01
                • 🔗 Module 2 Foundations of Cybersecurity
                • Attacks in the digital age
                • Common attacks and their effectiveness
                • Determine the type of attack
                • Glossary terms from module 2
                • Introduction to the eight CISSP security domains Part 1
                • Introduction to the eight CISSP security domains Part 2
                • Keep Your Cool during a data breach
                • Past CyberSecurity Attacks
                • Understand attackers
                • Welcome to module 2
                • Wrap-up Module 02
                • 🔗 Module 3 Foundations of Cybersecurity
                • Controls, frameworks, and compliance
                • Ethical concepts that guide cybersecurity decisions
                • Ethics in Cybersecurity
                • Glossary terms from module 3
                • Heather Protect sensitive data and information
                • Holly The importance of ethics as a cybersecurity professional
                • Introduction to security frameworks and controls
                • Secure Design
                • Welcome to module 3
              • Foundations of Cybersecurity
            • 🔗 Google Cybersecurity Professional Certificate
                • 🔗 Module 1 Crash Course on Python
                • Course Introduction
                • Crash Course on Python
                • Specialization Introduction
            • 🔗 Google IT Automation with Python Professional Certificate
          • 100+ Docker Concepts you Need to Know
          • Docker in 100 Seconds
          • Kerberos Authentication
          • Kubernetes 101
            • 🔗 CS50's Introduction to Computer Science
            • Week 0 - Scratch
          • 🔗 HackTheBox CTF
          • Checker
          • Loggy
          • Low Logic
          • OnlyHacks
            • 🔗 Introduction to Active Directory
            • Active Directory Research Over the Years
            • Active Directory Structure
            • Why Active Directory?
            • 🔗 Learning Process
            • Ways of Thinking
          • 🔗 HTB Academy
            • 1. Read YAML data - Python to process YAML with Codespaces
            • Career Essentials in GitHub Professional Certificate
            • Docker
            • How Actions Works
            • Python to process YAML with Codespaces
              • 1 - Docker Explained
              • 2 - Install Docker
              • 3 - Using Docker
              • History of service-based architectures
              • Microservices - Solver of problems but not the silver bullet
              • Microservices - The new kid on the block
              • Service-oriented architecture
              • The monolithic application
              • What you need to know
            • 🔗Microservices Foundations Professional Certificate byKong
            • 🔗 Prepare for the GitHub Foundations Certification
            • Branches
            • Changing History
            • Deleting and renaming files
            • git diff
            • Git stash and clean
            • Github Options
            • Ignore Files - gitignore
            • Manage Conflicts
            • Pushing to Github
            • Setting up Git
            • Understanding Environments
            • What is Git
            • What is Github
            • What is Version Control
          • Bypassing Filters
          • Data Link Layer Header
          • IP Addressing and Subnetting
          • More about -sV and -sC
          • More About Alternate Data Stream
          • More About JQ
          • Predictable Randomness and Weak Seeding in PHP
          • Understanding `$0` in awk
          • Understanding 2>&1 in Unix-like Shells
          • Unix Epoch
          • Why We used seed range as constant range?
            • 🔐 Ethereum Fundamentals
            • Blockchain and Hashing
            • Blockchain Benefits and Disadvantages
            • Blockchain Operations
            • Ethereum Basics
            • The New Blockchain - Blockchain 2.0
          • 🔗 PicoGym
          • ASCII Numbers
          • Based
          • Big Zip
          • Binhexa
          • Blame Game
          • Bookmarklet
          • CanYouSee
          • Collaborative Development
          • Commitment Issues
          • Cookies
          • dont-you-love-banners
          • endianness
          • First Find
          • Glory of the garden
          • Includes
          • Information
          • Inspect HTML
          • Inspector
          • interencdec
          • Local Authority
          • runme.py
          • SansAlpha
          • Scan Surprise
          • Scavenger Hunt
          • Secret of the Polyglot
          • Special
          • Super SSH
          • Time Machine
          • Unminify
          • Useless
          • Verify
          • WebDecode
          • Where are the robots
            • 🔗 CSS
            • 1 - CSS Introduction
            • 2 - Syntax
            • 3 - Selectors
            • 4 - CSS Colors
            • 5 - Measurements
            • 6 - CSS Fonts
            • 7 - Text Alignment and Decoration
            • 8 - CSS Backgrounds
            • 9 - Shorthands
            • 10 - Box Model
            • 11 - The Border Box
            • 12 - The Padding Box
            • 13 - The Margin Box
            • 14 - Lines and Blocks
            • 15 - Position Property
            • 16 - Position Relative and Z index
            • 17 - Box Sizing
            • 18 - Fixed Position
            • 19 - Sticky Position
            • 20 - Float
            • 21 - Pseudo Classes
            • 🔗 HTML
            • 1 - What is HTML?
            • 2 - HTML Syntaxes
            • 3 - HyperLinks
            • 4 - HTML Images
            • 5 - HTML Audio
            • 6 - HTML Videos
            • 7 - Text Formatting
            • 8 - HTML Lists
            • 9 - HTML Tables
            • 10 - HTML Colors
            • 11 - Span & Div
            • 12 - Meta Tags
            • 13 - iFrames
            • 14 - HTML Buttons
            • 15 - HTML Forms
            • 🔗 NextJs 101
            • Fireship beyond 100 seconds NextJs
            • NextJs in 100 Seconds (Full beginners Tutorial)
            • 🔗 Programming 101 (Fundamentals)
            • before you code, learn how computers work
            • JavaScript 101
            • JSON 101
            • TypeScript 101
              • 🔗 Udemy - The Ultimate React Course 2024 React, Next.js, Redux & More
              • Pure React
              • React Vs Vanilla JavaScript
              • What is REACT?
              • Why do FrontEnd Frameworks Exists
            • 🔗 React
            • All The JavaScript You Need To Know For React
            • All The JavaScript You Need To Know For React (More JS To Know)
            • React Introduction - Bro Code
            • 🔗 SQL
            • 1 - SQL Introduction
            • 2 - Setup MySQL
            • 3 - MySQL How to create a DATABASE
            • 4 - MySQL How to Create Table
            • 5 - MySQL How to INSERT rows into a TABLE
            • 6 - How to Select Data from a TABLE
            • 🔗 Supabase 101
          • 🔗 Programming
          • Pi Metasploitable
          • Raspberry Pi Kali-Linux Headless Setup
            • Advent of Cyber 2024 ⛄️❄️
            • Day 1 Maybe SOC-mas music, he thought, doesn't come from a store?
            • Day 2 One man's false positive is another man's potpourri
            • Day 3 Even if I wanted to go, their vulnerabilities wouldn't allow it
            • Day 4 I'm all atomic inside!
            • Day 5 SOC-mas XX-what-ee
            • Day 6 If I can't find a nice malware to use, I'm not going
            • Day 7 Oh, no. I'M SPEAKING IN CLOUDTRAIL!
            • Blue
            • Decryptify
            • Epoch
            • IDE
            • Light
            • RootMe
            • Simple CTF
            • TryHack3M Bricks Heist
            • W1seGuy
            • Command Line
            • Cryptography
            • Networking
            • Networking Fundamentals
            • Windows and AD Fundamentals
            • CyberSecurity 101
            • Active Directory Basics
            • Bypass Really Simple Security
            • Command Injection
            • Cryptography Basics
            • Defensive Security Intro
            • Intro to LAN
            • Linux Shells
            • Metasploit Introduction
            • Networking Concepts
            • Networking Core Protocols
            • Networking Essentials
            • Offensive Security Intro
            • Public Key Cryptography Basics
            • Search Skills
            • SOC L1 Alert Triage
            • Summary - Active Directory Basics
            • Walking An Application
            • What is Networking
            • Windows Command Line
            • Windows Fundamentals 1
            • Windows Fundamentals 2
            • Windows Fundamentals 3
            • Windows PowerShell
          • 🐧 TryHackMe
          • Content Discovery
          • Networking Secure Protocols
          • TryHackMe TODO List
      • About Me
      • Blog Posts 📚
    Home

    ❯

    tags

    ❯

    Tag: Assembly

    Tag: Assembly

    1 item with this tag.

    • Jun 08, 2025

      before you code, learn how computers work

      • programming
      • LowLevel
      • Assembly
      • Blog
      • programming101

    NeoSpace©2024 🐉