Home New Trending Search
About Privacy Terms
#
#reverse
Posts tagged #reverse on Bluesky
Final Fantasy: Extreme-2nd Kraken fight
Final Fantasy: Extreme-2nd Kraken fight YouTube video by o0Lanterns0o

Final Fantasy: Extreme-2nd Kraken fight youtube.com/shorts/Uf7W_...

#Kraken's #2nd #fight can #end you, A #Master can #reverse that.

#finalfantasy #Romhack #Rpg #Shorts #Youtube

4 1 0 0
Original post on hackaday.com

DR-DOS Is Back, But Not Quite as We Knew It If you weren’t around for the early PC era, or were a little more casual about operating systems, you could perhaps be forgiven for not knowing that DO...

#Retrocomputing #Software #Development #dos #DR-DOS #operating […]

[Original post on hackaday.com]

0 0 0 0
Original post on hackaday.com

DR-DOS Is Back, But Not Quite as We Knew It If you weren’t around for the early PC era, or were a little more casual about operating systems, you could perhaps be forgiven for not knowing that DO...

#Retrocomputing #Software #Development #dos #DR-DOS #operating […]

[Original post on hackaday.com]

0 0 0 0
Original post on hackaday.com

DR-DOS Is Back, But Not Quite as We Knew It If you weren’t around for the early PC era, or were a little more casual about operating systems, you could perhaps be forgiven for not knowing that DO...

#Retrocomputing #Software #Development #dos #DR-DOS #operating […]

[Original post on hackaday.com]

1 0 0 0
Video thumbnail

Let @xgabrielphoenix.bsky.social sloooooww motion cum… in reverse!

#rewind #reverse #backwards #slowmotion #asfr

1 0 0 0
Insiders claim Reverse Engineering retrieved UFOs has not succeeded This video examines Eric Burlison’s claims regarding a legacy UFO program, including allegations of whistleblower assassinations, and NASA’s reaction to a directive concerning UFO files. It also addresses assertions about limited UFO craft retrievals and the challenges of reverse engineering by the early 2010s. Furthermore, the discussion highlights a “Disclosure” Day movie trailer, emphasizing the psychic aspects of alien encounters. 00:00:00 – Topics 00:01:07 – Welcome Message from Dr. Salla 00:01:25 – Indian epics describing advanced societies that had technologies far superior to what is publicly available today. https://x.com/JasonWilde108/status/2030596891692417332 00:03:41 – US Congressman Eric Burlison has encountered a faction of the legacy UFO program that uses assassination to silence critics or remove whistleblowers. https://x.com/Unexplained2020/status/2030595462277865791 00:07:27 – Inner Earthers intervene to free surface humanity from Cabal control. https://exopolitics.org/inner-earthers-intervene-to-free-surface-humanity-from-cabal-control/ 00:09:35 – Quantum Tunneling: Consciousness Transfer Between bodies For Classified Projects – JP Update 55 https://exopolitics.org/quantum-tunneling-consciousness-transfer-between-bodies-for-classified-projects-jp-update-55/ 00:11:28 – NASA Administrator Jared Isaacman says he has seen no evidence of ET life. https://x.com/UAPJames/status/2031893114735001792 00:15:08 – Leading aerospace entrepreneur, Robert Bigelow, claims that attempts to reverse-engineer recovered alien craft have not succeeded. https://x.com/MichaelSalla/status/2032434879292477487 00:20:49 – Another trailer for the Disclosure Day movie emphasizes the psychic element in the ET phenomenon. Soft disclosure is being used to prepare billions for what’s coming. https://x.com/disclosureday/status/2032109435905356219 00:23:41 – Dr. Eric Davis claims that there have been less than 40 UFO craft retrievals and that he has met 5 people working on unsuccessful reverse engineering programs. https://x.com/MichaelSalla/status/2032443281527754955 00:29:04 – Ross Coulthart gives a succinct account of the disappearance of Maj General McCasland https://x.com/MichaelSalla/status/2032472649423573211 00:31:46 – Closing thoughts from Dr. Salla Join Dr. Salla on Patreon for Early Releases, Webinar Perks and More. Visit https://Patreon.com/MichaelSalla/ #Exopolitics #ExopoliticsToday #MichaelSalla **Podcast Episode #590** **Watch onPatreon, YouTube, Spotify & Rumble**** ** **Audio Podcast onApple, Spotify, or Google** ### Share this: * Share on X (Opens in new window) X * Share on Facebook (Opens in new window) Facebook * ### Like this: Like Loading...

Insiders claim Reverse Engineering retrieved UFOs has not succeeded This video examines Eric Burlison’s claims regarding a legacy UFO program, including allegations of whistleblower assassination...

#Uncategorized #reverse #engineering

Origin | Interest | Match

0 0 0 0

Insiders claim Reverse Engineering retrieved UFOs has not succeeded This video examines Eric Burlison’s claims regarding a legacy UFO program, including allegations of whistleblower assassination...

#Exopolitics #Podcasts #Featured #Week #in #Review #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Почему половина бытовой техники на самом деле — это маленькие Linux-компьютеры Обычная стиральная машина, телевизор, камера наблюдения или автомобиль сегодня часто оказываются полноценными Linux-системами с процессором, памятью и сетью. Я разобрал несколько таких устройств и...

Почему половина бытовой техники на самом деле — это маленькие Linux-компьютеры Когда я впервые подключился п...

#linux #embedded #Linux #IoT #устройства #reverse #engineering #uart #прошивки #встраиваемые #системы

Origin | Interest | Match

0 0 0 0
Preview
a yellow sign that says rewind with two arrows pointing in opposite directions ALT: a yellow sign that says rewind with two arrows pointing in opposite directions

Tag some videos that should be reversed! 😉⏪⏪

#gaysex #backwards #reverse #rewind #asfr

1 1 0 0
Preview
Taming the dragon: reverse engineering firmware with Ghidra  | Pen Test Partners Introduction I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It’s free, extensible, and supports some of the quirkier architectures we come across. But its learning curve is steep. This blog post is the culmination of my learnings from spending what may be too many hours in front of Ghidra’s glaring and dated UI. It focuses […]

Taming the dragon: reverse engineering firmware with Ghidra Introduction I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in ...

#Hardware #Hacking #How #Tos #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Trump administration must make New York tunnel payments, appeals court rules The U.S. federal government must keep making payments ​on the $16 billion New York Hudson Tunnel after an appeals court on Wednesday rejected the Trump administration's ‌bid to halt paying for the pro...

#JUST #IN: A U.S. #appeals court rejected the Trump administration bid to #reverse an order that requires it to make #payments to the #authority overseeing the $16 billion New York #Hudson #Tunnel.

3 1 0 0
Preview
Debate Over UAP Reverse Engineering, Crash Retrieval Claims, and Special Access Secrecy Eric Weinstein joins host Patrick Scott Armstrong on VETTED to examine claims surrounding UAP crash retrievals, reverse engineering, and the role of classified programs. The discussion weighs the need for theoretical physics expertise, the possibility of decoy efforts within special access programs, and unverified assertions about crash counts and personal sightings.

Eric Weinstein joins Patrick Scott Armstrong on VETTED to probe claims of UAP crash retrievals, reverse engineering and secret special-access programs - weighing theory needs, potential decoys, and unverified crash/sighting reports #UAP #Crash #Secrecy #Reverse

2 0 0 0
Original post on hackaday.com

It’s 1979 – What Exactly Did That ∫ Key Do? [Michel Jean] asked a question few others might: what exactly is going on under the hood of a classic HP scientific calculator when one presses the...

#classic #hacks #Reverse #Engineering #algorithm #HP #hp […]

[Original post on hackaday.com]

0 0 0 0
Original post on hackaday.com

It’s 1979 – What Exactly Did That ∫ Key Do? [Michel Jean] asked a question few others might: what exactly is going on under the hood of a classic HP scientific calculator when one presses the...

#classic #hacks #Reverse #Engineering #algorithm #HP #hp […]

[Original post on hackaday.com]

0 0 0 0
Preview
Cracking/patching software that requires a usb license dongle. Software Architecture & Software Development Projects for $30-250 USD. Looking for someone who is proficient in cracking/patching software that requires a usb license don



#C #Programming #C++ #Programming #Reverse #Engineering #Software #Architecture #Software #Development #Windows

Origin | Interest | Match

0 0 0 0
Preview
Take A Ride On Wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware hacking and reverse engineering concepts in an engaging way, with practical examples that make even the most complex of topics approachable. But one of the problems with having a back catalog of written articles is making sure they remain accessible as time goes on. (Ask us how we know.) Without some “algorithm” at play that’s going to kick out the appropriate article when it sees you’re interested in sniffing SPI, there needs to be a way to filter through the posts and find what’s relevant. Which is why the new “Roadmap” feature that [wrongbaud] has implemented on his site is so handy. At the top of the page you’ll find [wrongbaud]’s recommended path for new players: it starts with getting your hardware and software together, and moves through working with protocols of varying complexity until it ends up at proper techno wizardry like fault injection. Clicking any one of these milestones calls up the relevant articles — beginners can step through the whole process, while those with more experience can jump on wherever they feel comfortable. There’s also buttons that let you filter articles by topic, so for example you can pull up anything related to I2C or SPI. Further down the page, there’s a helpful “Common Questions” section that gives you a brief overview of how to accomplish various goals, such as identify an unknown UART baud rate, or extract the contents of an SPI flash chip. Based on the number and quality of the articles, [wrongbaud]’s site has always been on our shortlist of must-see content for anyone looking to get started with hardware hacking, and we think this new interface is going to make it even more useful for beginners who appreciate a structured approach to learning.

Take a Ride on wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware ...

#hardware #Reverse #Engineering #reverse #engineering #wrongbaud

Origin | Interest | Match

0 0 0 0
Preview
Take A Ride On Wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware hacking and reverse engineering concepts in an engaging way, with practical examples that make even the most complex of topics approachable. But one of the problems with having a back catalog of written articles is making sure they remain accessible as time goes on. (Ask us how we know.) Without some “algorithm” at play that’s going to kick out the appropriate article when it sees you’re interested in sniffing SPI, there needs to be a way to filter through the posts and find what’s relevant. Which is why the new “Roadmap” feature that [wrongbaud] has implemented on his site is so handy. At the top of the page you’ll find [wrongbaud]’s recommended path for new players: it starts with getting your hardware and software together, and moves through working with protocols of varying complexity until it ends up at proper techno wizardry like fault injection. Clicking any one of these milestones calls up the relevant articles — beginners can step through the whole process, while those with more experience can jump on wherever they feel comfortable. There’s also buttons that let you filter articles by topic, so for example you can pull up anything related to I2C or SPI. Further down the page, there’s a helpful “Common Questions” section that gives you a brief overview of how to accomplish various goals, such as identify an unknown UART baud rate, or extract the contents of an SPI flash chip. Based on the number and quality of the articles, [wrongbaud]’s site has always been on our shortlist of must-see content for anyone looking to get started with hardware hacking, and we think this new interface is going to make it even more useful for beginners who appreciate a structured approach to learning.

Take a Ride on wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware ...

#hardware #Reverse #Engineering #reverse #engineering #wrongbaud

Origin | Interest | Match

0 0 0 0
Original post on hackaday.com

Reverse-Engineering the Bluetooth Fichero Thermal Label Printer Protocol It’s hard to deny that label printers have become more accessible than ever, but an annoying aspect of many of these cheap...

#Peripherals #Hacks #Reverse #Engineering #ble #bluetooth […]

[Original post on hackaday.com]

0 1 0 0
Original post on hackaday.com

Reverse-Engineering the Bluetooth Fichero Thermal Label Printer Protocol It’s hard to deny that label printers have become more accessible than ever, but an annoying aspect of many of these cheap...

#Peripherals #Hacks #Reverse #Engineering #ble #bluetooth […]

[Original post on hackaday.com]

0 0 0 0
Post image

Reverse: 1999 3.3.0 + FULL DATA
Download on Blog Daimon Z website ~ (check comments)

#DaimonZ #DownloadGame #GameAndroid #Android #MobileGame #Game #GIM #Reverse #Reverse1999 #RPG #Turnbased #TurnBasedRP

1 1 1 0

You know I had to reverse time on @teninchtopx.bsky.social again 😈⏪⏪

#rewind #reverse #backwards

12 4 0 0
Preview
Reverse Engineering The PROM For The SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the time, nor did it offer much of an upgrade path. None of which is a concern to hobbyists who are more than happy to work around any hardware- and software limitations to e.g. install much faster CPUs. While quite a few CPU upgrades were possible with just some BGA chip reworking skills, installing the 900 MHz RM7900 would require some PROM hacking, which [mattst88] recently took a shake at. The initial work on upgrading SGI O2 systems was done in the early 2000s, with [Joe Page] and [Ian Mapleson] running into the issue that these higher frequency MIPS CPUs required a custom IP32 PROM image, for which they figured that they’d need either SGI’s help. Since SGI is no longer around, [mattst88] decided to take up the torch. After downloading a 512 kB binary dump of the last version of the O2’s PROM, he set to work reverse-engineering it, starting by dissembling the file. A big part of understanding MIPS PROM code is understanding how the MIPS architecture works, including its boot process, so much of what followed was a crash-course on the subject. With that knowledge it was much easier to properly direct the Capstone disassembler and begin the arduous process of making sense of the blob of data and code. The resulting source files now reassemble into bit-identical ROM files, which makes it likely that modifying it to support different CPUs is now possible with just a bit more work. For those who want to play along, [mattst88] has made his ip32prom-decompiler project available on GitHub. Thanks to [adistuder] for the tip. * * * Top image: Silicon Graphics 1600SW LCD display and O2 workstation. (Source: Wikimedia)

Reverse Engineering the PROM for the SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the tim...

#Reverse #Engineering #mips #sgi

Origin | Interest | Match

1 0 0 0
Preview
Reverse Engineering The PROM For The SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the time, nor did it offer much of an upgrade path. None of which is a concern to hobbyists who are more than happy to work around any hardware- and software limitations to e.g. install much faster CPUs. While quite a few CPU upgrades were possible with just some BGA chip reworking skills, installing the 900 MHz RM7900 would require some PROM hacking, which [mattst88] recently took a shake at. The initial work on upgrading SGI O2 systems was done in the early 2000s, with [Joe Page] and [Ian Mapleson] running into the issue that these higher frequency MIPS CPUs required a custom IP32 PROM image, for which they figured that they’d need either SGI’s help. Since SGI is no longer around, [mattst88] decided to take up the torch. After downloading a 512 kB binary dump of the last version of the O2’s PROM, he set to work reverse-engineering it, starting by dissembling the file. A big part of understanding MIPS PROM code is understanding how the MIPS architecture works, including its boot process, so much of what followed was a crash-course on the subject. With that knowledge it was much easier to properly direct the Capstone disassembler and begin the arduous process of making sense of the blob of data and code. The resulting source files now reassemble into bit-identical ROM files, which makes it likely that modifying it to support different CPUs is now possible with just a bit more work. For those who want to play along, [mattst88] has made his ip32prom-decompiler project available on GitHub. Thanks to [adistuder] for the tip. * * * Top image: Silicon Graphics 1600SW LCD display and O2 workstation. (Source: Wikimedia)

Reverse Engineering the PROM for the SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the tim...

#Reverse #Engineering #mips #sgi

Origin | Interest | Match

0 0 0 0
Preview
Reverse Engineering The PROM For The SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the time, nor did it offer much of an upgrade path. None of which is a concern to hobbyists who are more than happy to work around any hardware- and software limitations to e.g. install much faster CPUs. While quite a few CPU upgrades were possible with just some BGA chip reworking skills, installing the 900 MHz RM7900 would require some PROM hacking, which [mattst88] recently took a shake at. The initial work on upgrading SGI O2 systems was done in the early 2000s, with [Joe Page] and [Ian Mapleson] running into the issue that these higher frequency MIPS CPUs required a custom IP32 PROM image, for which they figured that they’d need either SGI’s help. Since SGI is no longer around, [mattst88] decided to take up the torch. After downloading a 512 kB binary dump of the last version of the O2’s PROM, he set to work reverse-engineering it, starting by dissembling the file. A big part of understanding MIPS PROM code is understanding how the MIPS architecture works, including its boot process, so much of what followed was a crash-course on the subject. With that knowledge it was much easier to properly direct the Capstone disassembler and begin the arduous process of making sense of the blob of data and code. The resulting source files now reassemble into bit-identical ROM files, which makes it likely that modifying it to support different CPUs is now possible with just a bit more work. For those who want to play along, [mattst88] has made his ip32prom-decompiler project available on GitHub. Thanks to [adistuder] for the tip. * * * Top image: Silicon Graphics 1600SW LCD display and O2 workstation. (Source: Wikimedia)

Reverse Engineering the PROM for the SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the tim...

#Reverse #Engineering #mips #sgi

Origin | Interest | Match

0 0 0 0

Noch ist nicht aller Nächte Morgen … #sprichwort #reverse

0 0 0 0

Lass uns aus dem Sonnenaufgang reiten … #sprichwort #reverse

0 0 0 0
Post image

Spice86 – A PC emulator for real mode reverse engineering Spice86 by OpenRakis is a tool to execute, reverse engineer and rewrite real mode DOS programs for which source code is not available. It...

#reverse #engineering #software #vintage #computing #FS-DOS

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chornobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Inside SKALA: How Chornobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0