14:00 man 1 is for user command while man 8 is primarily for root account. each section is specific and is part of the underline document regarding to the object orientation and understanding the man page. So an example would be if it you are reading from man 1 it is assumed the user assumes standard user privileges while pages from section 8 the literature would not include the permissions while assuming root during the explanation/documentation... Cheers!
Super noob question, but how exactly do you safely handle downloading malware samples? From the video it seems like you just downloaded the sample and opened it up, is that what you're supposed to do and just make sure to not open the actual file? Also are you using a VM when you analyse malware samples?
You can set up a virtual machine for your malware analysis or run your samples in the cloud. In this video, I wasn't running anything though, just static analysis :)
please bring more reversing videos like getting started with RE and analysis. Your teaching style is very unique and it will really help new comers.
This is great. The content is educational, the video quality is stellar, and your ASMR-quality voice is super easy to listen to
Fantastic! Bravo and thank you! Easy to follow, super interesting, and now on to part 2...
Thank you for sharing the knowledge!
14:00 man 1 is for user command while man 8 is primarily for root account. each section is specific and is part of the underline document regarding to the object orientation and understanding the man page. So an example would be if it you are reading from man 1 it is assumed the user assumes standard user privileges while pages from section 8 the literature would not include the permissions while assuming root during the explanation/documentation...
Cheers!
This is a fantastic yt channel! Super high quality, could you do some more reverse engineering videos? Thanks 🎉
Lmao the EVA intro, I can already tell this is a banger
Fascinating seeing a white-wizard in flow. Thanks.
Again nice one new information thanks a lot Laurie!
Great content! Thanks for sharing
😮 nice video ❤️
Your a great teacher a came across
How does this only have 8k views..
The Evangelion opening ❤❤❤
Evangelion intro ❤️
Super noob question, but how exactly do you safely handle downloading malware samples?
From the video it seems like you just downloaded the sample and opened it up, is that what you're supposed to do and just make sure to not open the actual file? Also are you using a VM when you analyse malware samples?
You definitely have to set up a virtual environment for this. #vm #vlan
You can set up a virtual machine for your malware analysis or run your samples in the cloud. In this video, I wasn't running anything though, just static analysis :)
I like your wallpaper
What's the best way to learn reverse engineering?
thank you : )
lol, video about linux, shows Windows code in the 0:08. LOVED IT
amazing voice and information. thank you , also you're beautiful to look at so that's a +1
how did you get into reversing, Laurie? big fan
never met someone use notepad ++ before
NERV cup))