A Guide to Assembler x86 for Beginners

A Guide to Assembler x86 for BeginnersIn our time, there is rarely a need to write in pure assembler, but I definitely recommend this to anyone who is interested in programming. You will see things from a different angle, and skills will come in handy when debugging code in other languages.
 
 
In this article, we will write the calculator from scratch. reverse Polish entry (RPN) on pure assembler x86. When finished, we can use it like this:
 
 
$ ./calc "32 + 6 *" # "(3 + 2) * 6" in the infix notation
30

 
All the code for article here . It ...
+ 0 -

What's new showed at Apple's presentation

What's new showed at Apple's presentation  
 
Less than an hour ago, the next annual Apple Event ended. The Steve Jobs Theater brought together journalists and tech-hikers, hungry for new information from the largest company on the planet and the first American trillionaire.
 
Part of the data on new devices Apple itself accidentally spoiled on its website. During its update in the code appeared mention of iPhone Xs, iPhone Xs Max and iPhone Xr. In addition to the names of "flowed" and some of the characteristics of new devices: the size of the screen, the amount of memory and the color of the case. But about the most interesting Tim Cook ...
+ 0 -

I'm not afraid of your NDA

I'm not afraid of your NDAThis is a loud and scary abbreviation of three not decent letters. Want to participate in the tender, get a job, you need to get data - you slip this piece of paper, they say, sign first, or you found fools without the NDA to tell you something. In most cases, you will not learn anything top secret or commercially important, but the procedure for signing the NDA has become a mystery of consecration, which the parties do not really ponder over the meaning.
 
 
This is just as you will inevitably receive a demand together with the constituent documents to provide an extract from the USRLE not ...
+ 0 -

The interplanetary file system is a trivial hash (identity), a DAG block and Protocol Buffers

The interplanetary file system is a trivial hash (identity), a DAG block and Protocol BuffersRecently, IPFS was added to support a trivial (identity) hash . In my article, I'll talk about it and show you how it can be used.
 
Let me remind you: InterPlanetary File System is a new decentralized file exchange network (HTTP server, , Content Delivery Network ). About her, I began the story in the article "Interplanetary IPFS file system" .
Usually, when hashing passes through hash function data is irreversibly "compressed" and the result is a short identifier...
+ 0 -

Apple Special Event, September 2018[текстовая трансляция]

Apple Special Event, September 2018[текстовая трансляция] At the beginning of last month Apple's capitalization was has broken through a trillion dollar mark, and more than half of The income of the company is brought by the iPhone. The lineup of its smartphones Apple updates traditionally in the fall. There is nothing surprising in that two-hour presentations are listened to by both electronics lovers and stock analysts, as well as representatives of the Android camp. Sometimes the producers of androids are borrowing some technical and design solutions, while not always ...
+ 0 -

The main theses from the interview of Ilona Mask at Joe Rogan

Ilon Mask came to comedian Joe Rogan on his podcast Joe Rogan Experience.
 
?5 hours they talked about AI, immortality, Neuralink, innovations, social networks, colonization of space, drilling tunnels, flamethrower, flying cars, renewable energy, car safety. We discussed Porsche and Rolex, corruption and the courts of Tesla, the kindness of people, the role of Mask in the history of mankind. As everyone already knows, we smoked the grass and drank whiskey.
 
youtu.be/vphWtgpe0kk Ilon Mask came to comedian Joe Rogan on his podcast Joe Rogan Experience. ?5 hours they talked about AI, immortality, Neuralink, innovations, social networks, colonization of space, drilling tunnels, flamethrower, flying cars, renewable energy, car safety. We discussed Porsche and Rolex, corruption and the courts of Tesla, the kindness of people, the role of Mask in the history of mankind. As everyone already knows, we smoked the grass and drank whiskey.  youtu.be/vphWtgpe0kk ...
+ 0 -

Expert Positive Technologies has discovered the possibility of disclosing encryption keys in Intel ME

Expert Positive Technologies has discovered the possibility of disclosing encryption keys in Intel ME
 
 
Image:
Unsplash

 
 
Intel has eliminated a serious vulnerability in the firmware of Intel ME. Expert Positive Technologies Dmitry Sklyarov found an error in the workings of the mechanisms of MFS security - the file system ME uses to store data. As a result of exploitation of this vulnerability, attackers can manipulate the state of MFS and extract some important secrets. found the vulnerability , the operation of which allows you to get all four keys and completely compromise the security mechanisms of MFS.
 
 
Later, Intel Corporation ...
+ 0 -

Management of micro services using Kubernetes and Istio

A short story about the advantages and disadvantages of microservices, the concept of Service Mesh and Google tools that allow you to run microservice applications without clogging your head with endless policy settings, accesses and certificates, and quickly finding errors that are not hidden in the code, but in microservice logic.
 
 
Management of micro services using Kubernetes and Istio
 
 
The article is based on Report by Craig Boxing at our last year's DevOops 2017 conference. Video and translation of the report - under the cut.
 
.Twitter ) - DevRel from Google, responsible for the direction of microservices ...
+ 0 -

Analysts from Wall Street: "Apple made us eat our hats"

Analysts from Wall Street: "Apple made us eat our hats"
 
 
Image: Unsplash
 
 
Apple recently became the first US company whose capitalization exceeded $ 1 billion. Analysts of Goldman Sachs earlier in their forecasts doubted the prospects of rapid growth of Apple due to the falling demand for the iPhone X.
 
 
However, now they are revised their attitude to the company and in a new message to customers noted that the smartphone manufacturer from Cupertino "made them eat their hats." Thus, analysts admitted that they were excessively ...
+ 0 -

Due to a vulnerability in the Tesla electric vehicle protection system, you can steal the car in a few seconds

Due to a vulnerability in the Tesla electric vehicle protection system, you can steal the car in a few seconds  
Electronic key Tesla
 
 
Tesla's electric vehicles can rightly be called a computer system, not a car. These machines are simply stuffed with electronics. Part of the electronic components are designed to prevent the theft of the machine, and the Tesla security system is considered quite serious. Electric cars regularly receive security updates, which improves the security of the vehicle.
 
 
But a few days ago a group of information security specialists showed that there is no need to break into a closed door - there is a fairly simple way to bypass protection. It's about the model Tesla Model S, a keychain ...
+ 0 -