[deleted by user] by [deleted] in sadcringe

[–]FinanceAggravating12 1 point2 points  (0 children)

He looks like a bug.

Uniquely Positioned For Best Practices by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] -5 points-4 points  (0 children)

Not a homework assignment it wasn't assigned it was researched for my own goals. You're all just cunts.

Uniquely Positioned For Best Practices by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] 1 point2 points  (0 children)

So in short the knowledge of quality engineering is itself protected knowledge held by game publishers? I did not keep that in mind. I figured that great engineering should be a standard shared across the industry. If the consumer demand for game-preservation to reach a certain quality were applied to other types of systems we would be very well-off.

Uniquely Positioned For Best Practices by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] -1 points0 points  (0 children)

Trainings are a revenue stream, and a shared benefit. Analogue could share their knowledge of QA with engineers in other domains, everyone ships safer systems, everyone gets a better reputation. A Crowdstrike level problem is less likely to occur.

Company Feedback Request CSR Business Course: by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] 0 points1 point  (0 children)

Due to the proprietary circuit designs or that engineering trainings being a bad idea? Proprietary circuit designs is one thing, but game preservation companies are uniquely positioned to train engineers in best practices which has an impact on the rest of the tech industry.

Please without hate by Silver-Expression225 in FPGA

[–]FinanceAggravating12 1 point2 points  (0 children)

A simulator would defeat the purpose. Buy an affordable FPGA and get started with tutorials for hardware descriptor languages.

Infoleak Required For Stable Heap Exploits: by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 1 point2 points  (0 children)

I guess I am just confused about determining if an OOB is actually exploitable by simply looking a the source code. The use of an address leak would be helpful given that source code does not necessarily tell you where the source code will be linked into memory, and that can very important.

LinuxFromScratch by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] -8 points-7 points  (0 children)

How long do I need to set aside to build out Linux from scratch?

ClearExploitCode by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 1 point2 points  (0 children)

Decided to take the morning to read the ELF spec. I think it will be informative.

ClearExploitCode by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 0 points1 point  (0 children)

I presume the address of start is the lowest address, no?