0.1 β Physical Machine
In one line: before you defend a computer, you should know what one actually is β down to the box and the wires.
Most security people skip hardware. They learn it the hard way years later β when they hit a buffer overflow that doesnβt make sense, or a BIOS rootkit they canβt see, or a side-channel attack on a CPU register they didnβt know existed.
We wonβt skip it. This chapter walks you through the machine like a curious mechanic walks around a car for the first time.
The tone for this chapter is simple: touch the real thing first, name the technical thing second, then ask what an attacker would do with it. That is the Feynman-style ladder for hardware security.
By the end youβll be able to:
- Open up a PC tower and name every part on the motherboard
- Explain what happens between pressing the power button and seeing the login screen
- Point at any component and say what an attacker would do with it
Lessons
- 0.1.1 What a computer actually is
- 0.1.2 Bits and bytes β how machines count
- 0.1.3 Hexadecimal and why hackers love it
- 0.1.4 Tour of a PC tower
- 0.1.5 The CPU β the worker
- 0.1.6 How a CPU runs one instruction
- 0.1.7 Registers and cache
- 0.1.8 RAM β the desk
- 0.1.9 Storage β HDD vs SSD vs NVMe
- 0.1.10 Motherboard, chipset, buses
- 0.1.11 GPU β the artist and the parallel calculator
- 0.1.12 Power, cooling, the case
- O β keyboard, mouse, USB, monitor
- UEFI β the pre-OS whisper
- 0.1.15 The full boot sequence
- π§ͺ 0.1.L1 Lab β open the box
Image credit
- Computer_from_inside_018.jpg β Kallerna, public domain.