In Linux, what encryption implementation approach is optimal given specific use & threat models?

Given the following use & threat models, what is the optimal encryption implementation? Optimal is defined as the approach best matching the use model.
Use Model

Computer must be optimized for performance.
Computer use will include s… Continue reading In Linux, what encryption implementation approach is optimal given specific use & threat models?

How Can I Modify a C Program to Gain Root Shell Access Without Using Sudo or Editing the Sudoers File?

I have a C program that, when executed on my Ubuntu virtual machine, provides a regular shell. The program includes the following code:
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>

int main() {
setuid(0… Continue reading How Can I Modify a C Program to Gain Root Shell Access Without Using Sudo or Editing the Sudoers File?

Differences in behavior between two Netcat and FIFO commands for creating a bind shell

I am trying to grasp the concept of terminal-emulators, shells and redirections.
I have two commands, both of them start a netcat listener for the bind shell:
1) rm /tmp/fifo; mkfifo /tmp/fifo; cat /tmp/fifo | /bin/bash -i 2>&1 | nc… Continue reading Differences in behavior between two Netcat and FIFO commands for creating a bind shell