Introduction to Assembly Language: Using Debug Tools

Introduction to Assembly Language: Using Debug Tools

1. Physical Memory Layout Formula When you see an address like 0B3F:0100 in debug, remember the physical address calculation formula: For example, 0B3F*10h+0100=0C3F0. This formula explains why CS:IP always points to strange memory locations (a legacy black magic of old programmers). 2. Core Command Anatomy Command Prototype: -a [address]Parameter Description: If address is not filled, … Read more

Quick Start Guide to Kiwi iOS Automation Testing Framework

testkuaibao|Software Testing Self-Learning WeChat Public Account 1, 2, 4 Every Day at 9:00, Don’t Miss It Introduction   Kiwi is a behavior-driven testing framework suitable for iOS development, designed to provide a simple and easy-to-use BDD (Behavior Driven Development) library. Installation   Install using Cocoapods, add the following configuration in the test Target: pod 'Kiwi', '3.0.0' Basic … Read more

Is X86 Assembly Truly a Terrifying Existence?

Is X86 Assembly Truly a Terrifying Existence?

Assembly Language, for those who have never delved deeply into it, can be incredibly arcane. Since our computers are developed based on assembly language, understanding this content will greatly help us clarify how the CPU works. The X86 computer is fully backward compatible with the IBM PC – from the top level of the system … Read more

Exploring the Computer Boot Process

Exploring the Computer Boot Process

2016 Microcomputer and Applications Issue 3 Author: Yuan Qianqian Abstract: This article provides a detailed study of the computer boot process and system loading, combining the collaborative calling mechanism between hardware and software. It offers a relatively comprehensive discussion of the entire process from pressing the power button to loading the operating system, ultimately displaying … Read more

iOS Reverse Engineering – Encryption Algorithms

iOS Reverse Engineering - Encryption Algorithms

👇👇Follow and reply “Join Group” to be added to the Programmer Group Chat👇👇 Author | iOS_BigBook Source | Juejin https://juejin.cn/post/7010665487809904647 1. Classification of Encryption Algorithms Hash (hash) functions: Not encryption algorithms. For example, MD5, SHA1/256/512 Symmetric encryption algorithms: DES, 3DES, AES (Advanced Encryption Standard, the keychain on Mac computers uses AES) Asymmetric encryption algorithms: RSA … Read more

Choicy: Manage Plugin Injection to Resolve App Crashes

Choicy: Manage Plugin Injection to Resolve App Crashes

After jailbreaking, you may encounter some issues. For example, apps crashing or certain plugins being incompatible with a specific app. Today, I recommend a plugin called Choicy, which manages plugin injection and can effectively resolve issues like app crashes after jailbreaking. Choicy Main features: This content requires jailbreaking. Completely free with rich functionality. Tested on … Read more

A Detailed Guide to the Linux Boot Process

A Detailed Guide to the Linux Boot Process

💻 A Detailed Guide to the Linux Boot Process ✨ Today, let’s take a detailed look at the Linux boot process, which is an important foundational knowledge for using the Linux system! 💕 1. Booting The beginning of everything is, of course, booting. When we press the power button, the entire startup process officially begins. … Read more

Why ARM Servers Use ACPI? ACPI vs DeviceTree

Why ARM Servers Use ACPI? ACPI vs DeviceTree

Click the above “Public Account” to subscribe! Recently, apart from the rampant news about the COVID-19 pandemic, the most attention-grabbing topic has undoubtedly been the war in Ukraine. Contrary to most people’s expectations, the war, which was thought to be one-sided, has become prolonged, much like the “temporary” lockdown in Shanghai — endless. Regardless of … Read more

A Review of My Painful Experiences with DSP Advertising

A Review of My Painful Experiences with DSP Advertising

Click to Follow ▲ Aiqi SEM Knowledge | Experience | News | Resources Four Major Sections From SEM to Integrated Internet Marketing Author: Gray Bear Original submission, unauthorized reproduction is prohibited For submissions, please send to: [email protected] Introduction: This experience sharing is not our first meeting, this time the article has been updated to reflect … Read more

Interconnection Between In-Car Infotainment Systems and Smartphones

Interconnection Between In-Car Infotainment Systems and Smartphones

With the rapid development of mobile internet, in-car infotainment systems need to obtain more flexible and rich applications and services through communication networks. For safety and stability considerations, services and applications running directly on in-car infotainment systems need to undergo strict testing and verification. Currently, the types of services that can be provided are still … Read more