ITKarma

All flows

Many eBooks, Jenkins containers, Tekton Pipelines, and 6 lessons on Istio Service Mesh

Useful links to live events, videos, meetups, tech books and books are below in our weekly post...

How Modern Linux Differ From Each Other

I have been working at Fast Reports for more than 15 years, and by the nature of my activity, I often have to deal with Linux, supporting one of the products...

Porting applications from QWidget to QML under Desktop

Hello, Khabrovchans! Recently, I often come across projects for desktop that need to be ported from QWidget to QML. Someone wants to write from scratch, someone to transfer old developments...

We reveal ProLock: analysis of the actions of the new ransomware operators using the MITER ATT & CK matrix

The success of ransomware attacks on organizations around the world is prompting more and more new attackers to "enter the game. " One of these new players is the ProLock ransomware group...

Polygons Another World: Sega Genesis

Translation the fifth article in the series from Fabien Sanglard , this time about Another World port on Sega Genesis. MegaDrive/Genesis began immediately after Sega launched its Master System in 1987...

Nostalgia Post: j2me, Gravity Defied, 64kb

This article does not pursue any practical goals - I just wondered how about 15 years ago, developers managed to make fully functional applications and games for weak phones of that time...

NSA, Ghidra and Unicorns

This time, the PVS-Studio team was attracted by Ghidra, a large and evil framework for reverse engineering with which you can analyze various binary files and do all kinds of scary things with them...

The reverse engineering of the Witcher 3 rendering: Milky Way, portals and color grading

[Previous parts of the analysis: first and second , third and fourth. ] Part 1: The Milky Way In a previous post, I talked about how shooting stars are implemented in The Witcher 3. There is no such effect in Blood and Wine...

Keeping the world at Snake Rattle'n'Roll

Many years ago I happened to Play Dendy's Snake Rattle'n'Roll game. I didn’t succeed then, because of the well-known in narrow circles bug with a fountain at level 7. Yes, and at the moment the game has not been completed...

Sewing machines controlled through Game Boy: writing an emulator

New thread of narration My journey was quite long, and today is the third anniversary of the start of the Edge of Emulation series of articles...

Reverse engineering of microchips by photo

Those who love hickporn photos from BarsMonster and his teammates are probably interested in learning how to decipher the logical scheme for her photo...

Source code for Command & Conquer published: see what's inside

Electronic Arts opened the source code for the first Command & amp; Conquer , as well as Command & amp; Conqueror: Red Alert. You can download it from GitHub...

Researchers have recovered a lost game for NES from 30-year-old floppy disks

Hi, I’m the founder of the Video Game History Foundation, Frank Sifaldi...

We receive and analyze the radio signal of the payment terminal using SDR

Hello, Habr. Recently, I had the opportunity to test a payment terminal with the possibility of contactless payment...

Easter egg in ionCube - an attempt by developers to sweep the trash under the carpet?

A web developer knows that scripts created for commercial purposes can go for a walk on the network with overwritten copyrights; it is possible that the script will start to resell on behalf of someone else...

Another's code - darkness: why is it dangerous to download "harmless" software from GitHub

Probably, everyone who reads this article is well acquainted with GitHub - the largest web service for hosting IT projects and their joint development. Here you can find almost any open source project...

“Kings” and “gods” of access: how the Russian-speaking hacker Fxmsp earned 100 million rubles on sales on the darknet

Today Group-IB presented a analytical report " Fxmsp: the invisible god of the network ” , revealing the identity of one of the most active sellers of access to corporate networks of companies, providing its services on the darkne...

RATKing: New Campaign with Remote Access Trojans

In late May, we discovered a malware distribution campaign for the Remote Access Trojan (RAT) class — programs that allow attackers to remotely control an infected system...

IDA Pro: working with library code (not WinAPI)

Hello everyone, When working in the IDA, I, and probably also you, often have to deal with applications that have a fairly large amount of code, do not have symbolic information and, moreover, contain a lot of library code...

We are writing a specification for Nvidia Kepler (CUDA binaries, language version sm_30) for Ghidra

Quite a lot of specifications for Ghidra have already been written for ordinary processor languages, but nothing for graphical ones...