Open Source Projects and Resources Related to Embedded Systems

Open Source Projects and Resources Related to Embedded Systems

Follow+Star Public Account, Don’t Miss Exciting Content Source | Embedded Miscellaneous One of the hardest things at the beginning of learning is finding study materials. This post carefully compiles some resources related to embedded systems, including but not limited to programming languages, microcontrollers, open-source projects, the Internet of Things, operating systems, Linux, and more. It … Read more

Linux Device Model: Architecture Of Driver World

Linux Device Model: Architecture Of Driver World

Hello, I am Lao Wu. Does every ambitious person feel that they can work a little harder? In the end, if the goal is not achieved, the reason for failure can always be attributed to “not trying a little harder”. However, the biggest misconception about effort is: the longer the time and the more painful … Read more

Router Vulnerability EXP Development Practice

Router Vulnerability EXP Development Practice

Author: Member of Hongri Security lifeand Blog Address: http://sec-redclub.com/team/ Book Giveaway: “Unveiling Home Router 0day Vulnerability Exploitation Techniques” Event Address: Free book giveaway in March Testing Environment Debian 9 Qemu This article mainly discusses the development of an exploit for the buffer overflow vulnerability in routers, using CVE-2013-0230 as an example. 0x01 Environment Setup Using … Read more

An Overview of Buildroot

An Overview of Buildroot

Buildroot is a tool that simplifies and automates the process of building a complete Linux system for embedded systems using cross-compilation. To achieve this, Buildroot can generate a cross-compilation toolchain, root filesystem, Linux kernel image, and bootloader for your target machine.Buildroot can be used independently for any combination of these options (for example, you can … Read more

Understanding the Linux Time Command: Essential Skills for Performance Tuning!

Understanding the Linux Time Command: Essential Skills for Performance Tuning!

Original link: https://bbs.huaweicloud.com/blogs/355148 Sometimes you may want to analyze your program based on the following parameters: Time spent by the program in user mode Time spent by the program in kernel mode Average memory usage of the program ETC On Linux, we have a utility called time designed specifically for this purpose. The time utility … Read more

Virtual Machines vs Wine: Embracing Windows on Linux

Virtual Machines vs Wine: Embracing Windows on Linux

Link: Linux Mystery Unlike virtual machines or traditional emulators, Wine does not fully simulate the entire Windows environment. Instead, it translates Windows API calls into POSIX calls, which is the standard interface for Unix-like systems. By avoiding full simulation, Wine saves the performance and memory overhead that comes with running a complete Windows operating system, … Read more

Linux Server Lag Savior: Release Cache Memory to Boost Performance by 30%

Linux Server Lag Savior: Release Cache Memory to Boost Performance by 30%

To speed up operations and reduce disk I/O, the kernel typically caches as much memory as possible, which is known as Cache Memory. By design, pages containing cached data can be repurposed as needed (for example, by applications). Cache memory is not automatically released after a program finishes running. This can lead to a situation … Read more

Linux Network Programming: Data Link Layer and ARP Protocol

Linux Network Programming: Data Link Layer and ARP Protocol

1. Related to MAC Frame (Simple Simulation to Build MAC Frame) Ethernet Header Structure Definition (C Language) #include <stdio.h> #include <stdint.h> // Ethernet header structure typedef struct { uint8_t destination_mac[6]; // Destination MAC address, 6 bytes uint8_t source_mac[6]; // Source MAC address, 6 bytes uint16_t ether_type; // Ethernet type, e.g., 0x0800 indicates IP protocol } … Read more

Essential Linux Commands for Hackers: 10 Practical Tips

Essential Linux Commands for Hackers: 10 Practical Tips

During penetration testing, the Linux command line is like a Swiss Army knife: compact yet powerful. Today, we will discuss ten particularly useful Linux commands that can make a hacker’s work more efficient and open the eyes of network security enthusiasts. Explore System Information: uname -a Want to know about your target machine? uname -a … Read more

Fixing NTFS Recognition Issues in Windows from Linux

Fixing NTFS Recognition Issues in Windows from Linux

When partitioning a SATA hard drive in Linux and formatting it with mkfs.ntfs, the files cannot be read when connected to Windows. By using Win+x to open Disk Manager, the hard drive is recognized (Disk1), but no drive letter is assigned: The context menu options are mostly greyed out, with only Delete Volume available. However, … Read more