The internet stopped being a lawless free‑for‑all a long time ago. Today it’s tightly policed, and any attempt to step beyond the hazy line of “free expression” gets shut down—a line even its architects can’t clearly define.…
CONTINUE READING 🡒 Category: Stuff
Game Developer’s Toolkit: The Best Free Software for Game Development
A game engine is the heart of any video game and the primary tool of a game developer. Primary, but not the only one! In this article, we’ll assemble a complete toolkit of free or low-cost software…
CONTINUE READING 🡒 Crypto Mining FAQ: What to Mine Today, How to Mine…
You hear the word “mining” everywhere these days—even from people far outside the IT world. Crypto exchanges are seeing unprecedented price swings, and in July the combined market cap of cryptocurrencies topped $100 billion. The hype is…
CONTINUE READING 🡒 Hands-on with the Omega2: What a Tiny, Low-Cost Linux Microcomputer…
Every maker eventually hits a point where basic microcontrollers just don’t cut it anymore, but dropping cash on a Raspberry Pi feels hard to justify. That’s where the modestly named Onion Omega2 comes in. It’s comparable to…
CONTINUE READING 🡒 Top 5 Web-Based Emulators for Classic Operating Systems and Retro…
Modern computers and browsers have reached impressive performance levels. Ten years ago, an interactive web app felt like a marvel; now JavaScript powers not just games, but even full-fledged emulators of vintage computers. We’ve picked a few…
CONTINUE READING 🡒 Design and Implement a Custom TCP Protocol and C# Server…
You’ve dealt with plenty of protocols over the years—some you’ve used, others you may have reverse‑engineered. Some were easy to read; others were indecipherable without a hex editor. In this article, I’ll show you how to design…
CONTINUE READING 🡒 How Keyloggers Evade Antivirus: A C# Proof of Concept
Full-fledged keyloggers packed with features and anti-detection measures can cost dozens, if not hundreds, of dollars. But a keylogger isn’t that complex, and if you want, you can build your own and even evade antivirus detection. In…
CONTINUE READING 🡒 Python Generators and Iterators: How They Work and When to…
These days, data is steadily becoming the “new oil” in terms of value. The catch is that the volumes we have to process are growing by the hour. Plenty of it won’t fit on a hard drive…
CONTINUE READING 🡒 Getting Started with VR: A Comprehensive Guide to Virtual Reality…
Public interest in VR waxes and wanes, but the tech keeps getting better. If you’re thinking about picking up a VR headset, this guide is for you: we’ll break down the strengths of what’s on the market…
CONTINUE READING 🡒 Python Computer Vision: Training a Neural Network for Bear vs.…
You’ve probably heard that neural networks have gotten amazingly good at recognizing objects in images lately. Our goal is to learn how to put them to work, because that power can be useful in all kinds of…
CONTINUE READING 🡒 Inside Magma: How the Russian GOST R 34.12-2015 block cipher…
In the previous installment of our “import-substitution misadventures,” we took a deep dive into the Kuznyechik (Grasshopper) block cipher defined in GOST 34.12–2015. Alongside Kuznyechik, the standard also specifies another cipher with a 64-bit block size called…
CONTINUE READING 🡒 Computer Vision with Python: Training a Neural Network for Digit…
Numeric CAPTCHAs used to be a great way to filter out bots, but you hardly see them anymore. You can probably guess why: neural networks now solve them better than we do. In this article, we’ll look…
CONTINUE READING 🡒 Building a Password Stealer: How to Extract Chrome and Firefox…
You’ve probably heard of a class of malware known as infostealers. Their goal is to exfiltrate valuable data from a victim’s system—most notably passwords. In this article, I’ll explain how they do that using Chrome and Firefox…
CONTINUE READING 🡒 JavaScript for Smart Homes: Arduino Is Out, ESP32 Takes Over
Interest in the Internet of Things is growing by the day—both Cisco and Samsung have rolled out their own IoT courses. The catch is that most of these courses rely on the companies’ proprietary hardware, which is…
CONTINUE READING 🡒 Harness the woolly beast! Identifying critical data in code with…
This article discusses three topics: (1) why should AppSec engineers closely monitor sensitive data contained in their products; (2) how to extract the structure of transmitted data from the service code; and (3) how to assess severity for particular fields in found objects in accordance with…
CONTINUE READING 🡒 Why Learning Assembly Language Still Matters
Are you thinking about learning assembly language but want to understand what benefits it will bring you as a programmer? Is it worthwhile to dive into the world of programming through assembly, or is it better to…
CONTINUE READING 🡒 Creating and Enhancing Your Own Python Port Scanner
Where does a server attack begin? That's right, with reconnaissance! There are many port scanners available, and they perform their tasks quickly and effectively. However, a true hacker should understand how their favorite tools work, so today,…
CONTINUE READING 🡒 Create Your Own Game Cheats: Developing a Trainer in C++
Everyone loves playing games, but it's much more exciting when you have an endless supply of ammo and health. To get both, you can search online for cheats and trainers for your favorite game. But what if…
CONTINUE READING 🡒 Introduction to Assembly Language: Beginner’s Guide to Getting Started
You've decided to learn assembly language but don't know where to start or what tools you need? Let me guide you through it using a "Hello, World!" program as an example. Along the way, I'll also explain…
CONTINUE READING 🡒 Programming Microcontrollers with Python: High-Level Language for Single-Board Computers
There's a joke that after a long day at the computer, a typical programmer goes home, sits down at the PC, and unwinds in the same way. The truth is even more daunting: many of us, after…
CONTINUE READING 🡒