Linux System Programming: Basic Concepts

Linux System Programming: Basic Concepts

Click the above“Mechanical and Electronic Engineering Technology”to follow us Host Machine The host machine (Host Machine) usually refers to the computer used for developing and compiling embedded software. The host machine is typically a high-performance desktop or laptop that runs standard operating systems such as Windows, Linux, or macOS. The main functions of the host … Read more

How to Compile C Programs in Linux

How to Compile C Programs in Linux

Article Word Count: 1400 Practical Index: ⭐⭐⭐⭐⭐ Common IDEs for compiling on Windows, while using gcc directly for compilation in Linux, is the foundation of Linux embedded programming and also a frequently asked question in embedded interviews. Command Line Compilation and Detailed Compilation Process Example code for hello.c: #include <stdio.h> int main(void) { printf("Hello world\n"); … Read more

Understanding Linux Root Filesystem Types

Understanding Linux Root Filesystem Types

The root filesystem is the first one that must be mounted during Linux startup; if the system cannot mount the root filesystem from the specified device, it will fail to start.Other filesystems can then be mounted automatically or manually. Therefore, different filesystems can coexist within a system.Different types of filesystems have different characteristics, thus they … Read more

How to Write Embedded Linux Device Drivers

How to Write Embedded Linux Device Drivers

Word Count:4500 Content Index:⭐⭐⭐⭐⭐ Concept of Linux Device Driver System calls are the interface between the operating system kernel and application programs, while device drivers serve as the interface between the operating system kernel and machine hardware. Device drivers abstract hardware details from application programs, allowing them to interact with hardware devices as if they … Read more

Understanding Serial Port Configuration in Embedded Development

Understanding Serial Port Configuration in Embedded Development

The serial port is a commonly used interface in computers, with the most common being the RS-232-C interface. It was established in 1970 by the Electronic Industries Alliance (EIA) in collaboration with Bell Systems, modem manufacturers, and computer terminal manufacturers as a standard for serial communication. Its full name is “serial binary data exchange interface … Read more

Getting Started with Ubuntu Linux: A Quick Guide

Getting Started with Ubuntu Linux: A Quick Guide

While I was waiting for the bus, I waited for one that never came, but those I didn’t wait for always arrived. This has a specific term in psychology: poverty. You can call me ugly, stupid, or lazy, but it doesn’t matter, only calling me poor will truly upset me. This society is too realistic; … Read more

Embedding Cortex-A: ST’s First Linux MPU Continues STM32’s Legacy

Embedding Cortex-A: ST's First Linux MPU Continues STM32's Legacy

With the rapid development of smart devices, ST’s MCU business has expanded rapidly. In recent years, popular applications such as shared bicycles, drones, and more IoT devices have mostly adopted the STM32 series MCUs.As the general market leader for Cortex-M32, since ST launched the first STM32F103 in 2007, STM32 has developed into a super platform … Read more

The Most Geeky Business Card: Runs Linux for Under $3

The Most Geeky Business Card: Runs Linux for Under $3

“ When it comes to the most geeky business cards, this PCB card that can run Linux will definitely catch your eye. ” This Linux-running business card is crafted by embedded systems engineer George Hilliard. The entire card is the size of a credit card, ultra-thin, practical, and costs less than $3. To create such … Read more

Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more

Analysis and Solution of an Unexpected Mining Trojan Virus

Analysis and Solution of an Unexpected Mining Trojan Virus

Since I changed my job position, I haven’t researched reverse security for about 4 or 5 years. I thought I would have no connection with this profession again, but unexpectedly, today I had a chance to “enjoy” it again due to a random opportunity. Recently, my colleagues in the company have been constantly reporting that … Read more