We pick Shararam - 1 part

We pick Shararam - 1 part 3r33855. 3r3-31. Hi Habr! I think many here know about the game "Shararam". And if you do not know that 3r314. better not to know 3r315. learn 3r3193. . 3r33841.  3r33855. 3r33841.  3r33855. I decided to make my own server of this game. 3r33841.  3r33855. 3r33841.  3r33855. Despite the fact that maybe Most likely this article will seem banal to the audience Habr, but I stupidly nowhere to put it on a general review. 3r33841.  3r33855. 3r318. 3r33841.  3r33855.

Tools

3r33841.  3r33855.
 3r33855.
Any browser with inspector
 3r33855.
Adobe Flash Media Server (3r33843. The old version ...[/h]
+ 0 -

Educational program in chemistry: acid reversing of microcircuits (how to expose a crystal of a microcircuit for subsequent photographing)

Educational program in chemistry: acid reversing of microcircuits (how to expose a crystal of a microcircuit for subsequent photographing) 3r3181. 3r3-31.
Introduction 3r3145. 3r3r1616.  3r3181. 3r3168. If you are already engaged in etching and photographing microcircuits, there is little you can learn from this article. However, if you want to take a picture of the chip, but do not know where to start, then this article is definitely for you. Also, keep in mind that the first steps in mastering this fascinating procedure will probably hurt you a little. 3r33170. 3r3r1616.  3r3181. 3r3168. Please, be extremely careful, then it will hurt you, although it will be, but not much. Also, if you have at least a tiny inclination towards ...
+ 0 -

Five years later the next version of DOSBox with the number ???-2

Five years later the next version of DOSBox with the number ???-2was released. Unfortunately, while the attention of crowds of people was riveted to the announcements of such giants of the industry as Apple, the release of one non-commercial, but rather popular gaming retro platform, was almost imperceptible. came out. DOSBox ???-2 .  If you by some miracle have missed this epoch, then I will remind you that DOSBox - emulator for PC, creating a DOS-environment, necessary for running old games and programs (with certain limitations) under MS-DOS. This allows you to play such games in a variety of operating systems that do not fully support or support DOS programs...
+ 0 -

We increase the randomness of that, and so[наверно] [почти]randomly

We increase the randomness of that, and so[наверно] [почти]randomly  
random numbers are more tasty if they are slightly peppered
 
 
We will combine theory with practice-we will show that an improvement in the entropy of random sequences is possible, after which we look at the source codes that do this.
 
 
I really wanted to write about the fact that qualitative, that is, highly entropic, generation of random numbers is critically important in solving a huge number of problems, but this is probably superfluous. I hope everyone knows this.
 
 
In the pursuit of qualitative random numbers, people invent very ingenious adaptations (see, eg, ...
+ 0 -

Examination of the HDD file system of the DVR model QCM-08DL

Examination of the HDD file system of the DVR model QCM-08DL  
 
This article is devoted to the study of the file structure of the hard drive of an eight-channel DVR with the purpose of mass extraction of files with video recordings. At the end of the article, the implementation of the corresponding program in C.
is given.  
 
DVR (abbreviated DVR) QCM-08DL is used in video surveillance systems and allows you to produce eight-channel recording of video and audio. This model, in my opinion, is one of the cheapest and at the same time reliable in operation. The video compression format is the popular H264 format. For audio, the ADPCM compression format is used. Video ...
+ 0 -

The project wideNES - we go to the borders of the screen NES

The project wideNES - we go to the borders of the screen NES

 
In the mid-1980s, the Nintendo Entertainment System (NES) was compulsory to purchase a console. The best sound, the best graphics and the best games among all consoles of that time - the prefix extended the boundaries of the possible. So far, such projects as
Super Mario Bros.
,
The Legend of Zelda
and
Metroid
are considered one of the best games of all time.
 
 
More than 30 years have passed since the release of NES, and the classic games feel fine, which can not be said for the gland on which they worked. With a resolution of only 256x24? the NES console could not provide enough space for the games...
+ 0 -

How I reanimated the device (JTAG emulator BH-USB-560v2) via U-Boot

I have doubts that the JTAG emulator for debugging processors from Texas Instruments is so common that its resuscitation would be of interest to someone. However, the article can be useful to those who are trying to reanimate something on the basis of a single-board with Linux, having limited resources and information. You can consider this as some practice of working with U-Boot.
 
How I reanimated the device (JTAG emulator BH-USB-560v2) via U-Boot
Blackhawk USB560v2 . I must admit, not the cheapest piece of hardware. And then one day she stopped working for no apparent reason.
 
Symptoms of
 
Everything happened one day, the device just stopped loading and being detected ...
+ 0 -

How I taught AI to play Tetris for NES. Part 1: analysis of the game code

In this article, I explore the deceptively simple mechanics of Nintendo Tetris, and in the second part I will tell you how the AI ​​that exploits these mechanics was created.
 
 
How I taught AI to play Tetris for NES. Part 1: analysis of the game code
 

Try it yourself


 

About the project


 
For those who do not have the perseverance, patience and time needed to master Nintendo Tetris, I created an AI that can play on its own. You can finally get to level 30 and even further. You will see how to get the maximum number of points and observe the infinite change in the counters of the series, levels and statistics. Find out what colors appear on levels beyond which a man ...[/h][/h]
+ 0 -

Heir Zeus: the more dangerous IcedID Trojan is for customers of banks

Experts Group-IB analyzed the Trojan attacking US bank customers, and posted the results of a deep parsing of the dynamic configuration data format with Python scripts and information on CnC servers.
 
 
Heir Zeus: the more dangerous IcedID Trojan is for customers of banks

 
In November 201? a team of researchers from IBM X-Force published a report on the new Trojan - IcedID , which is aimed primarily at customers of American banks. The bot has many capabilities of the infamous Zeus malicious software, including: downloads and launches modules, collects and passes to the server authentication data, information about the infected device, man-in-the-browser (MITB) ...
+ 0 -

Almost OCR for getting the VPNBook password. PHP + Mikrotik

Recently VPNBook began to publish the password instead of direct text in the form of an image. "Well, it's like that," I thought, and began to look for ways to solve this problem. Recognize the "picture" VPNBook password in PHP. And, of course, the script for Mikrotik.
 
Customize the automatic obtaining of a password for VPN on Mikrotik ". Prior to the problem, the password for VPNBook could simply be extracted from the html page, for example, as:
 
 
preg_match ('/Password:
([^<]+) /', $ homepage, $ matches);
print ($ matches[1])

 
And recently the password has become a "picture". And ...
+ 0 -