Trending

#reverse

Latest posts tagged with #reverse on Bluesky

Latest Top
Trending

Posts tagged #reverse

Insiders claim Reverse Engineering retrieved UFOs has not succeeded This video examines Eric Burlison’s claims regarding a legacy UFO program, including allegations of whistleblower assassinations, and NASA’s reaction to a directive concerning UFO files. It also addresses assertions about limited UFO craft retrievals and the challenges of reverse engineering by the early 2010s. Furthermore, the discussion highlights a “Disclosure” Day movie trailer, emphasizing the psychic aspects of alien encounters. 00:00:00 – Topics 00:01:07 – Welcome Message from Dr. Salla 00:01:25 – Indian epics describing advanced societies that had technologies far superior to what is publicly available today. https://x.com/JasonWilde108/status/2030596891692417332 00:03:41 – US Congressman Eric Burlison has encountered a faction of the legacy UFO program that uses assassination to silence critics or remove whistleblowers. https://x.com/Unexplained2020/status/2030595462277865791 00:07:27 – Inner Earthers intervene to free surface humanity from Cabal control. https://exopolitics.org/inner-earthers-intervene-to-free-surface-humanity-from-cabal-control/ 00:09:35 – Quantum Tunneling: Consciousness Transfer Between bodies For Classified Projects – JP Update 55 https://exopolitics.org/quantum-tunneling-consciousness-transfer-between-bodies-for-classified-projects-jp-update-55/ 00:11:28 – NASA Administrator Jared Isaacman says he has seen no evidence of ET life. https://x.com/UAPJames/status/2031893114735001792 00:15:08 – Leading aerospace entrepreneur, Robert Bigelow, claims that attempts to reverse-engineer recovered alien craft have not succeeded. https://x.com/MichaelSalla/status/2032434879292477487 00:20:49 – Another trailer for the Disclosure Day movie emphasizes the psychic element in the ET phenomenon. Soft disclosure is being used to prepare billions for what’s coming. https://x.com/disclosureday/status/2032109435905356219 00:23:41 – Dr. Eric Davis claims that there have been less than 40 UFO craft retrievals and that he has met 5 people working on unsuccessful reverse engineering programs. https://x.com/MichaelSalla/status/2032443281527754955 00:29:04 – Ross Coulthart gives a succinct account of the disappearance of Maj General McCasland https://x.com/MichaelSalla/status/2032472649423573211 00:31:46 – Closing thoughts from Dr. Salla Join Dr. Salla on Patreon for Early Releases, Webinar Perks and More. Visit https://Patreon.com/MichaelSalla/ #Exopolitics #ExopoliticsToday #MichaelSalla **Podcast Episode #590** **Watch onPatreon, YouTube, Spotify & Rumble**** ** **Audio Podcast onApple, Spotify, or Google** ### Share this: * Share on X (Opens in new window) X * Share on Facebook (Opens in new window) Facebook * ### Like this: Like Loading...

Insiders claim Reverse Engineering retrieved UFOs has not succeeded This video examines Eric Burlison’s claims regarding a legacy UFO program, including allegations of whistleblower assassination...

#Uncategorized #reverse #engineering

Origin | Interest | Match

0 0 0 0

Insiders claim Reverse Engineering retrieved UFOs has not succeeded This video examines Eric Burlison’s claims regarding a legacy UFO program, including allegations of whistleblower assassination...

#Exopolitics #Podcasts #Featured #Week #in #Review #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Почему половина бытовой техники на самом деле — это маленькие Linux-компьютеры Обычная стиральная машина, телевизор, камера наблюдения или автомобиль сегодня часто оказываются полноценными Linux-системами с процессором, памятью и сетью. Я разобрал несколько таких устройств и...

Почему половина бытовой техники на самом деле — это маленькие Linux-компьютеры Когда я впервые подключился п...

#linux #embedded #Linux #IoT #устройства #reverse #engineering #uart #прошивки #встраиваемые #системы

Origin | Interest | Match

0 0 0 0
Preview
a yellow sign that says rewind with two arrows pointing in opposite directions ALT: a yellow sign that says rewind with two arrows pointing in opposite directions

Tag some videos that should be reversed! 😉⏪⏪

#gaysex #backwards #reverse #rewind #asfr

1 1 0 0
Preview
Taming the dragon: reverse engineering firmware with Ghidra  | Pen Test Partners Introduction I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It’s free, extensible, and supports some of the quirkier architectures we come across. But its learning curve is steep. This blog post is the culmination of my learnings from spending what may be too many hours in front of Ghidra’s glaring and dated UI. It focuses […]

Taming the dragon: reverse engineering firmware with Ghidra Introduction I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in ...

#Hardware #Hacking #How #Tos #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Trump administration must make New York tunnel payments, appeals court rules The U.S. federal government must keep making payments ​on the $16 billion New York Hudson Tunnel after an appeals court on Wednesday rejected the Trump administration's ‌bid to halt paying for the pro...

#JUST #IN: A U.S. #appeals court rejected the Trump administration bid to #reverse an order that requires it to make #payments to the #authority overseeing the $16 billion New York #Hudson #Tunnel.

3 1 0 0
Preview
Debate Over UAP Reverse Engineering, Crash Retrieval Claims, and Special Access Secrecy Eric Weinstein joins host Patrick Scott Armstrong on VETTED to examine claims surrounding UAP crash retrievals, reverse engineering, and the role of classified programs. The discussion weighs the need for theoretical physics expertise, the possibility of decoy efforts within special access programs, and unverified assertions about crash counts and personal sightings.

Eric Weinstein joins Patrick Scott Armstrong on VETTED to probe claims of UAP crash retrievals, reverse engineering and secret special-access programs - weighing theory needs, potential decoys, and unverified crash/sighting reports #UAP #Crash #Secrecy #Reverse

2 0 0 0
Original post on hackaday.com

It’s 1979 – What Exactly Did That ∫ Key Do? [Michel Jean] asked a question few others might: what exactly is going on under the hood of a classic HP scientific calculator when one presses the...

#classic #hacks #Reverse #Engineering #algorithm #HP #hp […]

[Original post on hackaday.com]

0 0 0 0
Original post on hackaday.com

It’s 1979 – What Exactly Did That ∫ Key Do? [Michel Jean] asked a question few others might: what exactly is going on under the hood of a classic HP scientific calculator when one presses the...

#classic #hacks #Reverse #Engineering #algorithm #HP #hp […]

[Original post on hackaday.com]

0 0 0 0
Preview
Cracking/patching software that requires a usb license dongle. Software Architecture & Software Development Projects for $30-250 USD. Looking for someone who is proficient in cracking/patching software that requires a usb license don



#C #Programming #C++ #Programming #Reverse #Engineering #Software #Architecture #Software #Development #Windows

Origin | Interest | Match

0 0 0 0
Preview
Take A Ride On Wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware hacking and reverse engineering concepts in an engaging way, with practical examples that make even the most complex of topics approachable. But one of the problems with having a back catalog of written articles is making sure they remain accessible as time goes on. (Ask us how we know.) Without some “algorithm” at play that’s going to kick out the appropriate article when it sees you’re interested in sniffing SPI, there needs to be a way to filter through the posts and find what’s relevant. Which is why the new “Roadmap” feature that [wrongbaud] has implemented on his site is so handy. At the top of the page you’ll find [wrongbaud]’s recommended path for new players: it starts with getting your hardware and software together, and moves through working with protocols of varying complexity until it ends up at proper techno wizardry like fault injection. Clicking any one of these milestones calls up the relevant articles — beginners can step through the whole process, while those with more experience can jump on wherever they feel comfortable. There’s also buttons that let you filter articles by topic, so for example you can pull up anything related to I2C or SPI. Further down the page, there’s a helpful “Common Questions” section that gives you a brief overview of how to accomplish various goals, such as identify an unknown UART baud rate, or extract the contents of an SPI flash chip. Based on the number and quality of the articles, [wrongbaud]’s site has always been on our shortlist of must-see content for anyone looking to get started with hardware hacking, and we think this new interface is going to make it even more useful for beginners who appreciate a structured approach to learning.

Take a Ride on wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware ...

#hardware #Reverse #Engineering #reverse #engineering #wrongbaud

Origin | Interest | Match

0 0 0 0
Preview
Take A Ride On Wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware hacking and reverse engineering concepts in an engaging way, with practical examples that make even the most complex of topics approachable. But one of the problems with having a back catalog of written articles is making sure they remain accessible as time goes on. (Ask us how we know.) Without some “algorithm” at play that’s going to kick out the appropriate article when it sees you’re interested in sniffing SPI, there needs to be a way to filter through the posts and find what’s relevant. Which is why the new “Roadmap” feature that [wrongbaud] has implemented on his site is so handy. At the top of the page you’ll find [wrongbaud]’s recommended path for new players: it starts with getting your hardware and software together, and moves through working with protocols of varying complexity until it ends up at proper techno wizardry like fault injection. Clicking any one of these milestones calls up the relevant articles — beginners can step through the whole process, while those with more experience can jump on wherever they feel comfortable. There’s also buttons that let you filter articles by topic, so for example you can pull up anything related to I2C or SPI. Further down the page, there’s a helpful “Common Questions” section that gives you a brief overview of how to accomplish various goals, such as identify an unknown UART baud rate, or extract the contents of an SPI flash chip. Based on the number and quality of the articles, [wrongbaud]’s site has always been on our shortlist of must-see content for anyone looking to get started with hardware hacking, and we think this new interface is going to make it even more useful for beginners who appreciate a structured approach to learning.

Take a Ride on wrongbaud’s Hardware Hacking Highway Regular Hackaday readers will no doubt be familiar with the work of Matthew Alt, AKA [wrongbaud]. His deep-dive blog posts break down hardware ...

#hardware #Reverse #Engineering #reverse #engineering #wrongbaud

Origin | Interest | Match

0 0 0 0
Original post on hackaday.com

Reverse-Engineering the Bluetooth Fichero Thermal Label Printer Protocol It’s hard to deny that label printers have become more accessible than ever, but an annoying aspect of many of these cheap...

#Peripherals #Hacks #Reverse #Engineering #ble #bluetooth […]

[Original post on hackaday.com]

0 0 0 0
Original post on hackaday.com

Reverse-Engineering the Bluetooth Fichero Thermal Label Printer Protocol It’s hard to deny that label printers have become more accessible than ever, but an annoying aspect of many of these cheap...

#Peripherals #Hacks #Reverse #Engineering #ble #bluetooth […]

[Original post on hackaday.com]

0 1 0 0
Post image

Reverse: 1999 3.3.0 + FULL DATA
Download on Blog Daimon Z website ~ (check comments)

#DaimonZ #DownloadGame #GameAndroid #Android #MobileGame #Game #GIM #Reverse #Reverse1999 #RPG #Turnbased #TurnBasedRP

1 1 1 0

You know I had to reverse time on @teninchtopx.bsky.social again 😈⏪⏪

#rewind #reverse #backwards

12 4 0 0
Preview
Reverse Engineering The PROM For The SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the time, nor did it offer much of an upgrade path. None of which is a concern to hobbyists who are more than happy to work around any hardware- and software limitations to e.g. install much faster CPUs. While quite a few CPU upgrades were possible with just some BGA chip reworking skills, installing the 900 MHz RM7900 would require some PROM hacking, which [mattst88] recently took a shake at. The initial work on upgrading SGI O2 systems was done in the early 2000s, with [Joe Page] and [Ian Mapleson] running into the issue that these higher frequency MIPS CPUs required a custom IP32 PROM image, for which they figured that they’d need either SGI’s help. Since SGI is no longer around, [mattst88] decided to take up the torch. After downloading a 512 kB binary dump of the last version of the O2’s PROM, he set to work reverse-engineering it, starting by dissembling the file. A big part of understanding MIPS PROM code is understanding how the MIPS architecture works, including its boot process, so much of what followed was a crash-course on the subject. With that knowledge it was much easier to properly direct the Capstone disassembler and begin the arduous process of making sense of the blob of data and code. The resulting source files now reassemble into bit-identical ROM files, which makes it likely that modifying it to support different CPUs is now possible with just a bit more work. For those who want to play along, [mattst88] has made his ip32prom-decompiler project available on GitHub. Thanks to [adistuder] for the tip. * * * Top image: Silicon Graphics 1600SW LCD display and O2 workstation. (Source: Wikimedia)

Reverse Engineering the PROM for the SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the tim...

#Reverse #Engineering #mips #sgi

Origin | Interest | Match

0 0 0 0
Preview
Reverse Engineering The PROM For The SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the time, nor did it offer much of an upgrade path. None of which is a concern to hobbyists who are more than happy to work around any hardware- and software limitations to e.g. install much faster CPUs. While quite a few CPU upgrades were possible with just some BGA chip reworking skills, installing the 900 MHz RM7900 would require some PROM hacking, which [mattst88] recently took a shake at. The initial work on upgrading SGI O2 systems was done in the early 2000s, with [Joe Page] and [Ian Mapleson] running into the issue that these higher frequency MIPS CPUs required a custom IP32 PROM image, for which they figured that they’d need either SGI’s help. Since SGI is no longer around, [mattst88] decided to take up the torch. After downloading a 512 kB binary dump of the last version of the O2’s PROM, he set to work reverse-engineering it, starting by dissembling the file. A big part of understanding MIPS PROM code is understanding how the MIPS architecture works, including its boot process, so much of what followed was a crash-course on the subject. With that knowledge it was much easier to properly direct the Capstone disassembler and begin the arduous process of making sense of the blob of data and code. The resulting source files now reassemble into bit-identical ROM files, which makes it likely that modifying it to support different CPUs is now possible with just a bit more work. For those who want to play along, [mattst88] has made his ip32prom-decompiler project available on GitHub. Thanks to [adistuder] for the tip. * * * Top image: Silicon Graphics 1600SW LCD display and O2 workstation. (Source: Wikimedia)

Reverse Engineering the PROM for the SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the tim...

#Reverse #Engineering #mips #sgi

Origin | Interest | Match

0 0 0 0
Preview
Reverse Engineering The PROM For The SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the time, nor did it offer much of an upgrade path. None of which is a concern to hobbyists who are more than happy to work around any hardware- and software limitations to e.g. install much faster CPUs. While quite a few CPU upgrades were possible with just some BGA chip reworking skills, installing the 900 MHz RM7900 would require some PROM hacking, which [mattst88] recently took a shake at. The initial work on upgrading SGI O2 systems was done in the early 2000s, with [Joe Page] and [Ian Mapleson] running into the issue that these higher frequency MIPS CPUs required a custom IP32 PROM image, for which they figured that they’d need either SGI’s help. Since SGI is no longer around, [mattst88] decided to take up the torch. After downloading a 512 kB binary dump of the last version of the O2’s PROM, he set to work reverse-engineering it, starting by dissembling the file. A big part of understanding MIPS PROM code is understanding how the MIPS architecture works, including its boot process, so much of what followed was a crash-course on the subject. With that knowledge it was much easier to properly direct the Capstone disassembler and begin the arduous process of making sense of the blob of data and code. The resulting source files now reassemble into bit-identical ROM files, which makes it likely that modifying it to support different CPUs is now possible with just a bit more work. For those who want to play along, [mattst88] has made his ip32prom-decompiler project available on GitHub. Thanks to [adistuder] for the tip. * * * Top image: Silicon Graphics 1600SW LCD display and O2 workstation. (Source: Wikimedia)

Reverse Engineering the PROM for the SGI O2 The SGI O2 was SGI’s last-ditch attempt at a low-end MIPS-based workstation back in 1996, and correspondingly didn’t use the hottest parts of the tim...

#Reverse #Engineering #mips #sgi

Origin | Interest | Match

0 0 0 0

Noch ist nicht aller Nächte Morgen … #sprichwort #reverse

0 0 0 0

Lass uns aus dem Sonnenaufgang reiten … #sprichwort #reverse

0 0 0 0
Post image

Spice86 – A PC emulator for real mode reverse engineering Spice86 by OpenRakis is a tool to execute, reverse engineer and rewrite real mode DOS programs for which source code is not available. It...

#reverse #engineering #software #vintage #computing #FS-DOS

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Entering SKALA codes during RBMK operation. (Credit: Pripyat-Film studio) Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, functional replica of an RBMK control room as at the Chornobyl Nuclear Power Plant – retired in the early 2000s – the [Chornobyl Family] channel has now moved on to the SKALA system. Previously we saw how they replicated the visually very striking control panel for the reactor core, with its many buttons and status lights. SKALA is essentially the industrial control system, with multiple V-3M processor racks (‘frames’), each with 20k 24-bit words of RAM. Although less powerful than a PDP-11, its task was to gather all the sensor information and process them in real-time, which was done in dedicated racks. Output from SKALA’s DREG program were also the last messages from the doomed #4 reactor. Unfortunately an industrial control system can only do so much if its operators have opted to disable every single safety feature. By the time the accident unfolded, the hardware was unable to even keep up with the rapid changes, and not all sensor information could even be recorded on the high-speed drum printer or RTA-80 teletypes, leaving gaps in our knowledge of the accident. (Credit: Chornobyl Family, YouTube) Setting up a genuine RTA-80 teletype is still one of the goals, but these old systems are not easy to use. Same with the original software that ran on these V-3M computer frames, which was loaded from paper tape (the ‘library’), including the aforementioned DREG program. This process creates executable code that is put on magnetic tapes, with magnetic tape also used for storage. (Credit: Chornobyl Family, YouTube) The workings of the SKALA system and its individual programs including KRV, DREG and PRIZMA are explained in the video, each having its own focus on a part of the RBMK reactor’s status and overall health. Interacting with SKALA occurs via a special keyboard, on which the operator enters command codes to change e.g. set points, with parameters encoded in this code. Using this method, RBMK operators can set and request values, with parameters and any error codes displayed on a dedicated display. There is also the Mnemonic Display for the SKALA system which provides feedback to the operator on the status of the SKALA system, including any faults. Although to many people the control system of a power plant is just the control room, with its many confusing buttons, switches, lights and displays, there is actually a lot more to it, with systems SKALA and its associated hardware an often overlooked aspect. It’s great to see this kind of knowledge being preserved, and even poured into a physical model that simulates the experience of using the system. The long-lived nature of nuclear power reactors means that even today 1960s and 1970s-era industrial automation system are still in active use, but once the final reactor goes offline – or is modernized during refurbishing – a lot of the institutional knowledge of these systems tends to vanish and with it a big part of history.

Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Preview
Inside SKALA: How Chornobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Inside SKALA: How Chornobyl’s Reactor Was Actually Controlled Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In th...

#History #Reverse #Engineering

Origin | Interest | Match

0 0 0 0
Post image

Grep-AST или Как мы заменили векторный поиск всего одной библиотекой Всем привет! На связи София из команды пр...

#grep-ast #ast #llm #rag #python #tree-sitter #reverse #engineering #llm-модели #embeddings #code

Origin | Interest | Match

0 0 0 0
Preview
Leveraging Generative AI to Reverse Engineer XLoader Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

research.checkpoint.com/2025/generat...

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

0 0 1 0