|
You are here |
dsat.igada.de | ||
| | | | |
austinmorlan.com
|
|
| | | | | I recently finished building Ben Eaters 8-bit Breadboard Computer but near the end of it I realized that much of the fun was in the design and the learning, but the act of actually cutting wire was an exercise in tedium. I wasnt quite ready to put the 8-bit computer behind me, but I didnt want to cut or bend wire anymore. Another thing thats been on my to-do list is programming for the original Game Boy (GB). | |
| | | | |
wiki.nesdev.com
|
|
| | | | | Tile compression refers to techniques that allow fitting more graphics data into a smaller space. Programs using CHR ROM cannot use compressed tiles, as their tile data must be stored in the PPU's native format. But programs using CHR RAM can process tile data while copying it from PRG ROM to CHR RAM, and this processing allows storing more tiles in the same space. | |
| | | | |
hjr265.me
|
|
| | | | | I remember seeing a tool many years ago that could hide other files in BMP image files. I was a bit too young to understand how it worked, but I think I understand the trick now: Understand the structure of the file type at the byte level. Find a spot that can hold an arbitrary length of data. Sneak in whatever you want in there. As a proof of concept, I used Go to make Sneak - a program to add or extract a hidden file in a ZIP archive. | |
| | | | |
blog.thalium.re
|
|
| | | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues. | ||