👀 Before the #radare2 6.0.6 release during the testing stage I spotted a crash on Windows and decided to write a post explaining how I fixed it using only the cmd interface 👉 https://trufae.github.io/aiblog/WinCdbNull-en.html
As a UNIX person I'm not comfortable on #windows but i was happy to learn some commandline #debugging tools and shared some insights for #reverseengineering in my writeup. Hope you enjoy the reading!
Sometimes I just get an idea and it won't go away
Edited to add, since this is now doing Numbers:
Fuck the Tories, fuck the Labour party, fuck the TERFs, free Palestine
hey fedi does anyone know much about reverse engineering fpga bitstreams? is that something that is doable? what tools do people use for this?
looking at a xilinx chip specifically, haven't identified the specific model yet, but it's one that's at least 20 years old
Ooops, I just loaded it in IDA :P Because fuck the software licenses :PPPP
first: my newest zine, The Secret Rules of the Terminal!
This has all the gnarly details about the Unix terminal that I wish I knew when I started using it. It's weird and kind of wonderful (I talk about why you can use your mouse in the terminal!)
https://wizardzines.com/zines/terminal/
(2/16)
python, the official language of "well i could just use python"
Colossal blunder on my part this afternoon.
Pulled the drives from an areca raid array and
forgot what order they have to go back in
so now the array isn't recognized and RESCUE doesn't see it.
Has anyone documented the magic parameter sectors that describe this anywhere?