Jump to content

Search the Community

Showing results for tags 'program'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Official
    • Announcements
    • Forum Information
    • Suggestions
    • Introductions
  • Gaming
    • Lounge
    • Platforms
    • Tutorials
  • Miscellaneous
    • Security & Research
    • Programming / Development
    • Linux
    • Windows
    • Android
  • Marketplace
    • Premium Tools
    • Premium Services

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me





Found 2 results

  1. Anybody knows what's the best way to secure Python source codes? I have personally been converting the source file into a compiled byte code but that wasn't enough as i could decompile it within 2 minutes and i found it very frustrating as i couldn't publish any of my python apps without depending solely on the backend. Any suggestions?
  2. I've been working with raw sockets for a bit, and I've managed to figure out IP header checksum calculation, but I've hit a wall here. What I can't seem to get a good understanding of is the checksums in the protocol (UDP, TCP, ICMP, etc) headers as seen in this screenshot. I understand that the pseudo header is involved, but what I don't understand from all of the guides that I could find is where the data (payload) comes in. The guides are very vague when it is mentioned, some imply that the data itself is used while others say it is only the length of the data. Could someone provide some more in-depth material on this subject? Or maybe a PoC script with comments explaining the process of the calculation?
  • Create New...