Posts
- Dec 15, 2025
Is your memory actually isolated, or is the OS just lying to you? In this part, we tear down the Virtual Memory illusion. We’ll walk page tables by hand, dissect the hardware mechanics, and see exactly what happens when your pointer hits the metal
- Dec 1, 2025
Having established the fundamentals, we now step into the Hacker’s Corner. In this chapter, we dig into the specific architectural details and design choices that transform standard memory management into a fascinating—and critical—landscape for security researchers.
- Nov 24, 2025
In this part we dig into the hardware mechanics that power x86 memory management. We explore the evolution from Real to Protected Mode and dissect the translation process from Logical to Linear addresses. You’ll learn how the Global Descriptor Table (GDT), Segment Selectors, and the Flat Memory Model function under...
- Jun 13, 2020
Primary memory is one of computer’s core components. The objective of this series is to explain memory primitives and techniques for security topics; therefore, the spotlight will be on core concepts rather on implementation details.