This 
The board schematics are not publicly available. However, from another laptop board's schematics, we can learn a bit about the components it should have:
| default['sshd']['sshd_config']['AuthenticationMethods'] = 'publickey,keyboard-interactive:pam' | |
| default['sshd']['sshd_config']['ChallengeResponseAuthentication'] = 'yes' | |
| default['sshd']['sshd_config']['PasswordAuthentication'] = 'no' |
| #!/bin/bash | |
| # This script is based on https://unix.stackexchange.com/revisions/480191/9 . | |
| # The following changes proved to be necessary to make it work on CentOS 7: | |
| # * removed disk info (model, size) - not very useful, might not work in many cases. | |
| # * using "bw" instead of "bw_bytes" to support fio version 3.1 (those availible through yum @base) | |
| # * escaping exclamation mark in sed command | |
| # * the ".fiomark.txt" is not auto-removed | |
| LOOPS=5 #How many times to run each test |
| pragma solidity =0.4.25; | |
| contract AcoraidaMonicaGame{ | |
| uint256 public version = 4; | |
| string public description = "Acoraida Monica admires smart guys, she'd like to pay 10000ETH to the one who could answer her question. Would it be you?"; | |
| string public constant sampleQuestion = "Who is Acoraida Monica?"; | |
| string public constant sampleAnswer = "$*!&#^[` a@.3;Ta&*T` R`<`~5Z`^5V You beat me! :D"; | |
| Logger public constant logger=Logger(0x5e351bd4247f0526359fb22078ba725a192872f3); | |
| address questioner; | |
| string public question; |
| oot from normal | |
| mt_pll_init + | |
| CLK_GATING_CTRL1:d891923e | |
| after set, CLK_GATING_CTRL1:d891923e | |
| CLK_GATING_CTRL2:7afdbf10 | |
| [PWRAP] pmic ID: 2092. | |
| [EMI] MDL number = 0 | |
| [EMI] PCDDR3 |
by 0xabad1dea September 2018
You may notice a decidedly Nintendo bias to the examples. I can't change who I am.
Speedrunning is:
| ; | |
| ; the "monitor ROM" of an apple 1 fit in one page (256 bytes). | |
| ; | |
| ; this is my attempt to take the disassembled code, give names to the | |
| ; variables and routines, and try to document how it worked. | |
| ; | |
| ; | |
| ; an apple 1 had 8KB of RAM (more, if you hacked on the motherboard), and a | |
| ; peripheral chip that drove the keyboard and video. the video was run by a | |
| ; side processor that could treat the display as an append-only terminal that |
Recently, news broke about a new possible offline attack on WPA2 using PMKID. To summarize the attack, WPA2 protected APs can end up broadcasting PMKID values which can then be used to offline-brute-force the password.
These PMKID values are computed this way:
PMKID = HMAC-SHA1-128(PMK, "PMK Name" | MAC_AP | MAC_STA)
| defmodule HiPE.Loader do | |
| @doc "Returns `module_info`s for all loaded modules, with `native: true|false`" | |
| def all_modules(native \\ false) do | |
| :code.all_loaded() | |
| |> Enum.map(&elem(&1, 0)) | |
| |> Enum.map(&Kernel.apply(&1, :module_info, [])) | |
| |> Enum.map(&Enum.into(&1, %{})) | |
| |> Enum.filter(fn %{compile: compile} -> | |
| !match?([], compile) | |
| end) |