|
You are here |
www.whizzy.org | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
peterkleissner.com
|
|
| | | | | [AI summary] A blog post discusses the reverse engineering of Supermicro's IPMI license key algorithm to bypass vendor lock-in and enable free BIOS updates, revealing the use of HMAC-SHA1 with a fixed secret key. | |
| | | | |
gregdavill.com
|
|
| | | | | An endeavour to add WiFi control to ducted air conditioner/heat pump system | |
| | | | |
peanball.net
|
|
| | | While browsing for different breakout boards for the Rover I've discovered a nice little board that has a push button and logic pin to control a MOSFET. This little contraption allows switching on and off the power, say through a USB cable. | ||