Richard Azu

Experienced in the deployment of voice and data over the 3 media; radio, copper and fibre, Richard – a system support technician with First National Bank Ghana Limited is still looking for ways to derive benefit from the WDM technology in Optics. Using Kali as a springboard, he has developed an interest in digital forensics and penetration testing.
Richard Azu

Stacks and Heap

Memory is a crucial resource for any system when conducting reverse engineering. Malware analysts must understand the way memory is assigned to a program.

Arrays, Structs and Linked Lists

Reverse engineering is the practice of analyzing a software system, either in whole or in part, to extract design and implementation information 1. This arti

Security in a Blue Data Background Illustration

How to use Radare2 for reverse engineering

This article defines reverse-engineering as it is used in the analysis of software. We will explain in detail how to use radare2 for reverse engineering.

Handwriting text writing Malware Analysis. Concept meaning performs deep analysis of evasive and unknown threats.

Windows Internals for Malware Analysis

Introduction This article defines Windows internals and illustrates tools which can be used to explore Windows internal systems. We’ll be defining malware a

Logical instructions in x86

This article defines logical instructions as executed by x86 processors. It goes on to describe four key classifications of logical instructions in brief.

Reverse engineering the binary code 3D illustration

Networking Basics for Reverse Engineers

Introduction This article will define network reverse engineering, list tools used by reverse engineers for reverse engineering and then highlight the networ

Wooden letters spelling VPN - virtual private network.

How to configure VPN in Windows 10

This article defines Virtual Private Network (VPN) and the three basic connection types of VPN: remote user, third-party to mask source IP and user activitie

Data technology background. Big data visualization. Flow of data. Information code. Background in a matrix style. 4k rendering.

Arithmetic Instructions

Introduction This article defines arithmetic instructions as executed by x86 processors. It goes on to describe in brief, four key classifications of arithme

Instructions in x86 assembly

Introduction This article will define three main categories of instructions in the x86 architecture. It will give examples in each of these categories and t

Registers in x86 assembly

Introduction This article will define three key types of registers in the x86 architecture and then go on to show simulations of registers’ contents after s

Operands in x86 assembly

Introduction This article defines an operand as it is used in x86 assembly instructions. It goes on to explain in detail, using simulations, three modes by

ASSEMBLY word written on wood block. ASSEMBLY text on wooden table for your desing, concept

Assembly Basics

Introduction This article gives details about assembly programming for the Intel 8086 microprocessor. It also presents very clear details by providing exampl