The post is well-regarded in the security community for its detailed breakdown of exploiting a vulnerability in how antivirus engines handle (often seen as .rar files). Key technical highlights from that "solid" post include:
If you were referring to a different "Black Hat" themed post or a specific file you found,
: Using specific techniques to manipulate the memory layout.