Marco Ivaldi<p>As a side note, since somebody asked… 20 years ago I would’ve (and I have in multiple occasions) recommended the legendary <a href="https://infosec.exchange/tags/abo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>abo</span></a> series by gera <a href="https://web.archive.org/web/20150418052653/http://community.coresecurity.com/~gera/InsecureProgramming/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2015041805</span><span class="invisible">2653/http://community.coresecurity.com/~gera/InsecureProgramming/</span></a></p><p><a href="https://infosec.exchange/tags/xdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xdev</span></a> <a href="https://infosec.exchange/tags/pwncollege" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pwncollege</span></a> <a href="https://infosec.exchange/tags/lectures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lectures</span></a> <a href="https://infosec.exchange/tags/challenges" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>challenges</span></a> <a href="https://infosec.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a></p>