Code: The Hidden Language of Computer Hardware and Software
Such an awesome book!
Code: The Hidden Language of Computer Hardware and Software walks the reader through the development of modern computer systems from the beginnings of binary codes, through digital logic theory, to assembly language and higher level languages.
The progression is so well developed, and the writing so easy to follow, that the reader can casually develop a complete understanding of the foundational building blocks of complex processors and computer systems.
Do those pesky captive portals and acceptable use policies torment you?
My interest in circumventing these barriers to internet access was piqued recently in 2600 Volume 33, Number 3: “Captive Portal Puzzle at Sea”.
This will definitely require further research…
Lessons from DEFCON 2016 – Bypassing Captive Portals
Please see my SSH Tunneling post as well
Years ago I was doing a school project that required programming a microprocessor. For some strange reason, my partner and I decided to write our firmware in assembly.
Although we made a lot more work for ourselves by doing so, I have since realized what a valuable experience this was.
This first occurred to me when reading the shellcoders handbook, which makes it very clear that serious and sofisticated hacks are performed by those who understand software at this fundamental level.
The Autumn 2016 edition of 2600 magazine, volume 33, number 3 has confirmed this idea yet again in the article “MOV before you JMP”.
I guess this means I should finish reading the shellcoder’s handbook and RE4B!
One of the most influential books I have ever read was “As a Man Thinketh”, by James Allen.
As discussed in this 2600 article, one’s thoughts are their own. However, with the constant pressure from outside influence (i.e. 24 hour news and media), the ability to control and qualify the input is an important skill.
As with any input, if not properly validated, it has the potential to wreak havoc on a system.
Don’t just take free thought for granted. Understand the power of influence, and push yourself to be the master of your own mind.
Expecting consultants & network management tools to solve your network problems is
like buying a spray can of ‘Clean My Garage’ at the hardware store. They rarely live up to the hype.
Reverse Engineering for Beginners
Open book on reverse engineering and assembly…
2600 Magazine, Volume 33, Number 2: “The Top Ten Reasons Why Hackers Should Get a HAM Radio License” has inspired me to get a HAM radio license!
#9 Echolink is where the internet meets radio… kind of cool.
The big takeaways, however, are digital modes, packet radio, AX25, and mesh networking.
Basically high powered wireless networking!