<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux &#8211; jcomes.org</title>
	<atom:link href="https://jcomes.org/category/lnx/feed" rel="self" type="application/rss+xml" />
	<link>https://jcomes.org</link>
	<description></description>
	<lastBuildDate>Sun, 26 Apr 2026 16:47:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">204893580</site>	<item>
		<title>Environment Setup for Secure Virtualized Workspace</title>
		<link>https://jcomes.org/secure-working-environment</link>
		
		<dc:creator><![CDATA[Jcomes]]></dc:creator>
		<pubDate>Sun, 29 Sep 2024 10:51:49 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://jcomes.org/?p=655</guid>

					<description><![CDATA[In this post, I’ll walk you through the environment I’m currently using for secure access to the internet and email services. The setup is designed with security in mind, and involves a host machine with two virtual machines (VMs). The host manages the connections through a custom firewall configuration, ensuring proper isolation between the VMs [&#8230;]]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">655</post-id>	</item>
		<item>
		<title>All about virtual memory III – Practical Example</title>
		<link>https://jcomes.org/abvmem-iii</link>
		
		<dc:creator><![CDATA[Jcomes]]></dc:creator>
		<pubDate>Wed, 28 Jun 2023 18:21:45 +0000</pubDate>
				<category><![CDATA[Kernel]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[x86_64]]></category>
		<guid isPermaLink="false">https://jcomes.org/?p=518</guid>

					<description><![CDATA[In the latest post we did a deep overview on how virtual memory works, but without focusing in any architecture. In this post we will discuss how virtual memory is implemented in x86_64 arch, by building a Linux kernel module. At the end, you will find a link to download the source code. Virtual memory [&#8230;]]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">518</post-id>	</item>
		<item>
		<title>ROPV &#8211; ROP gadget finder tool for RISC-V binaries</title>
		<link>https://jcomes.org/ropv</link>
		
		<dc:creator><![CDATA[Jcomes]]></dc:creator>
		<pubDate>Wed, 17 Aug 2022 17:35:48 +0000</pubDate>
				<category><![CDATA[Binary explotation]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[RISC-V]]></category>
		<category><![CDATA[Userland]]></category>
		<guid isPermaLink="false">https://jcomes.org/?p=122</guid>

					<description><![CDATA[As my first post, I would like to talk about my final degree project. The idea behind the project was to build a program like ropshell, that searches for ROP gadgets but only focused in binaries from the RISC-V architecture. In this post I&#8217;ll be explaining the motivation behind this work, some background around Return [&#8230;]]]></description>
		
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">122</post-id>	</item>
	</channel>
</rss>
