Published onNovember 26, 2021nand2tetris Series 02 - Computing Sum of 1 to 10nand2tetrisComputing the sum of 1 to 10 in hack computer assembly, demonstrating loops and conditional jumps.
Published onNovember 18, 2021nand2tetris Series 01 - Implementing an Infinite Loop in Assemblynand2tetrisImplementing an infinite loop in hack computer assembly, breaking down how symbols, A-instructions, and JMP work together.
Published onJune 9, 2021Analyzing Zeek's SSH Brute Force Detection ScriptzeekdpiAnalyzing Zeek's built-in SSH brute force detection script, understanding its detection logic and threshold design.
Published onApril 30, 2021Using Zeek to Analyze POP3 Protocol (2)zeekdpiContinuing POP3 protocol analysis — extracting and reconstructing email content.
Published onApril 26, 2021Using Zeek to Analyze POP3 Protocol (1)zeekdpiUsing Zeek to parse POP3 protocol, exploring Zeek's API and event-driven protocol analysis.