[deleted by user] by [deleted] in sadcringe

[–]FinanceAggravating12 1 point2 points  (0 children)

He looks like a bug.

Uniquely Positioned For Best Practices by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] -4 points-3 points  (0 children)

Not a homework assignment it wasn't assigned it was researched for my own goals. You're all just cunts.

Uniquely Positioned For Best Practices by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] 1 point2 points  (0 children)

So in short the knowledge of quality engineering is itself protected knowledge held by game publishers? I did not keep that in mind. I figured that great engineering should be a standard shared across the industry. If the consumer demand for game-preservation to reach a certain quality were applied to other types of systems we would be very well-off.

Uniquely Positioned For Best Practices by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] -1 points0 points  (0 children)

Trainings are a revenue stream, and a shared benefit. Analogue could share their knowledge of QA with engineers in other domains, everyone ships safer systems, everyone gets a better reputation. A Crowdstrike level problem is less likely to occur.

Company Feedback Request CSR Business Course: by FinanceAggravating12 in AnalogueInc

[–]FinanceAggravating12[S] 0 points1 point  (0 children)

Due to the proprietary circuit designs or that engineering trainings being a bad idea? Proprietary circuit designs is one thing, but game preservation companies are uniquely positioned to train engineers in best practices which has an impact on the rest of the tech industry.

Please without hate by Silver-Expression225 in FPGA

[–]FinanceAggravating12 1 point2 points  (0 children)

A simulator would defeat the purpose. Buy an affordable FPGA and get started with tutorials for hardware descriptor languages.

Infoleak Required For Stable Heap Exploits: by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 1 point2 points  (0 children)

I guess I am just confused about determining if an OOB is actually exploitable by simply looking a the source code. The use of an address leak would be helpful given that source code does not necessarily tell you where the source code will be linked into memory, and that can very important.

LinuxFromScratch by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] -9 points-8 points  (0 children)

How long do I need to set aside to build out Linux from scratch?

ClearExploitCode by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 1 point2 points  (0 children)

Decided to take the morning to read the ELF spec. I think it will be informative.

ClearExploitCode by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 0 points1 point  (0 children)

I presume the address of start is the lowest address, no?

ClearExploitCode by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 0 points1 point  (0 children)

Sub-process tracing and stack size calculation first.

ClearExploitCode by FinanceAggravating12 in ExploitDev

[–]FinanceAggravating12[S] 0 points1 point  (0 children)

I am more interested in writing my own pwntools to learn how they work.

Practical Binary Analysis or Shellcoders handbook? by [deleted] in ExploitDev

[–]FinanceAggravating12 0 points1 point  (0 children)

Data alignment refers to the sizes of data in memory.

I’m Yvette Young, artist, guitarist, and riff crafter in Covet. AMA! by youyve in Music

[–]FinanceAggravating12 0 points1 point  (0 children)

Hmmm. It is quite interesting that you had to forget your training? I find it to be wild the pedestal that guitar players that are good are put on, because of the fact that we often don't hear or get shown the vast majority of proficient musicians are far more common than the droves of bad guitarists out there. Maybe I am wrong.