Bookmarks
- programming (35)
- reversing (23)
- lisp (14)
- video-games (13)
- security (12)
- retro-tech (11)
- hardware (11)
- c (10)
- programming-languages (6)
- x86 (6)
- math (6)
- culture (6)
- optimization (6)
- linux (6)
- scheme (5)
- game-hacking (5)
- rust (5)
- binary-exploitation (5)
- functional-programming (5)
- cogsci (4)
- emacs (4)
- 6502 (4)
- common-lisp (4)
- graphics (4)
- z80 (3)
- emacs-lisp (3)
- historical (3)
- rant (3)
- arm (3)
- guile (3)
- operating-systems (3)
- video (3)
- crypto (3)
- writing (2)
- jabber (2)
- c++ (2)
- nes (2)
- dolphin (2)
- practices (2)
- game-development (2)
- windows (2)
- go (2)
- ctf (2)
- dos (2)
- mips (2)
- distributed-systems (2)
- politics (2)
- interactive (1)
- writeup (1)
- n64 (1)
- ham (1)
- biology (1)
- android (1)
- china (1)
- ida (1)
- dart (1)
- formal-methods (1)
- pgp (1)
- compilers (1)
- sustainability (1)
- powerpc (1)
- doom (1)
- quackery (1)
- guix (1)
- bitcoin (1)
- algorithms (1)
- python (1)
- java (1)
- opengl (1)
- tor (1)
- demoscene (1)
- computer-networks (1)
- fitness (1)
- databases (1)
- activitypub (1)
- xbox (1)
- xnu (1)
- lean (1)
Finding and Exploiting Hidden Features of Animal Crossings NES Emulator
binary-exploitation, c, dolphin, game-hacking, ida, powerpc, retro-tech, reversing, video-games
Arbitrary Code Execution in Ocarina of Time
binary-exploitation, game-hacking, mips, n64, security, video, video-games
Tony Hawk’s Pro Strcpy – I Code 4 Coffee
binary-exploitation, game-hacking, x86, xbox, security, video, video-games
Disassembling Jak & Daxter
VMU Hackery
Controlling my A/C with a Gameboy
The Insane Innovation of TI Calculator Hobbyists
wInd3x, the iPod Bootrom exploit 10 years too late
Fixing a bug in an 18 year old Shockwave game
Battletoads text decompression (huffman)
Zelda Screen Transitions are Undefined Behavior
Sonic Battle (GBA) Renderer Series
How Much of a Genius-Level Move Was Using Binary Space Partitioning in Doom?
Investigating a recent ebook DRM system (c. 2018)
BattlEye reverse engineer tracking
Looking inside the box
Analysis of the 2015 ESET Crackme challenge
Adventures in reverse engineering Broadcom NIC firmware
Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine
Reverse Engineering TicketMaster's Rotating Barcodes (SafeTix)
Modifying Telegram's "People Nearby" feature to pinpoint people's homes
Just use Signal, folks.
GPS, Galileo & More: How do they work & what happened during the big outage?
[DSCTF 2019] CPU Adventure – Unknown CPU Reversing
You Won't Believe This One Weird CPU Instruction!
Glitching a $20k Piece of History
Coding Stories: Me vs. The VNC Guy
A Great Old-Timey Game-Programming Hack
6502, game-development, programming, retro-tech, video-games
CGA in 1024 Colors - a New Mode: the Illustrated Guide
Memories
Ubershaders: A Ridiculous Solution to an Impossible Problem
dolphin, graphics, hardware, opengl, programming, video-games
GDCCs Memory Model
Code Conversion Language
c, emacs, emacs-lisp, lisp, optimization, programming, reversing
The General Problem
compilers, functional-programming, guile, lisp, programming, scheme, x86
Reflecting on Transducers
What the Hero Sees: Field-of-View for Roguelikes
programming, algorithms, dart, game-development, interactive, video-games
A Constructive Look At TempleOS
Org mode and Haunt
Good Style in modern Emacs Packages
Emacs: from catching up to getting ahead
Guix: A most advanced operating system
functional-programming, guile, guix, linux, lisp, programming, scheme
Lisp Hackers
Pascal Costanzas Highly Opinionated Guide to Lisp
The Nature of Lisp
A Road to Common Lisp
MOST-POSITIVE-BIGNUM
Meta-Circular Adventures in Functional Abstraction
Cons cells vs. Linked lists
fibs, lies, and benchmarks
functional-programming, lisp, optimization, programming, programming-languages, scheme
Models of Generics and Metaprogramming: Go, Rust, Swift, D and More
c, c++, go, optimization, programming, programming-languages, rust
I am a Java, C#, C or C++ developer, time to do some Rust
programming, programming-languages, rust
A refreshing, conversational take on the features that make Rust unique. Also worth looking at is the author's follow-up article, Frustrated? It's not you, it's Rust
The curse of strong typing
I want off Mr. Golang's Wild Ride
John Carmack on Inlined Code
Implementing a NES Emulator in Rust
How Wine works 101
Smashing the heap by overflowing the stack
Creating a Rootkit to Learn C
How to use Trend Micro's Rootkit Remover to Install a Rootkit
Reverse Engineering a GPU from 2009
Patching nVidia GPU driver for hot-unplug on Linux
Building a Homebrew Video Game Console
c, hardware, programming, z80
Doing a math assignment with the Lean theorem prover
Approximating the Sine Function
Looping Music Seamlessly
Programmers Need To Learn Statistics Or I Will Kill Them All
The PGP Problem
While I feel the author's suggestion to "[u]se Signal. Or Wire, or WhatsApp, or some other Signal-protocol-based secure messenger" is well-intentioned, I strongly dislike advocating for nonfree software and network services that are run unethically. I am a proponent of OMEMO/XMPP.
I may start using signify for my own software. Of course, I won't entirely give up on PGP, but I think that signing with both would be enough to signal my endorsement of the former.
The lack of a suggested alternative for email is particularly depressing to me. Why haven't we come up with a better system yet?
And the author does well to admit that PGP is still a fair choice for encrypting files. I see myself continuing to use pass for years to come.
Update:I've come back to this article a few years after adding it to this page. I now walk back on the rather inflammatory suggestion that Signal is "nonfree software and network services that are run unethically". While I prefer services that are federated rather than centralized, Signal currently serves as a secure messenger for the less technically inclined. Not to mention, OMEMO/XMPP is derived from the Signal protocol.
Furthermore, I did not verify the claims made in this article. It happens to be quiterubbish.
Move Fast & Roll Your Own Crypto
Despite the imperative title, this is not a suggestion to roll one's own crypto. This is an analysis of the abysmal security in the Zoom video conferencing software.
Crackpot Cryptography and Security Theater
Deanonymizing Tor Circuits
c, computer-networks, distributed-systems, programming, security, tor
This is one of many excellent articles written by Dr. Neal Krawetz on security in Tor. I would encourage reading other articles on his website, if you are interested in this sort of thing.
Infectious Executable Stacks
In Noisy Digital Era, Elegant Internet Still Thrives
An NPR article from 2012 about the SDF public access UNIX system.
Codecademy vs. The BBC Micro
Graying Out
What's Wrong With XMPP?
Does Visual Studio Rot the Mind?
Software disenchantment
Writing system software: code comments.
Indirection Is Not Abstraction
"ActivityPub: past, present, future" - Keynote by Christopher Lemmer Webber #apconf
Fundamentals of Optimal Code Style: Cognitively-Oriented Approach to Improving Program Readability
An interesting approach to justifying, scientifically, an "optimal" code style.
Augmenting Long-term Memory
The Process of Mastering a Skill
Thoughts on Strength Training
Crafting "Crafting Interpreters"
Writing well
The Long Hack: How China Exploited a U.S. Tech Supplier
The CCP is the enemy.