Services
Find Stuff
Pages
Buy My Apps
Other Stuff I’ve Built
Book Club
Archives
- May 2018
- February 2014
- December 2013
- November 2013
- August 2012
- July 2012
- April 2012
- March 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
Categories
- Boxing (23)
- Energy (5)
- iPhone (142)
- Jack Handy (283)
- NaNoWriMo (3)
- People (11)
- Planet Microsoft (5)
- Projects (88)
- Python (43)
- Reelviews (13)
- Reverse Engineering (18)
- Six Word Stories (111)
- The Hard Way (3)
- Uncategorized (6)
- UNIX (8)
- Vacation Slides (30)
- Web stuff (51)
Blogroll
Category Archives: Reverse Engineering
Neuromancer Codewheel – Part 2
Editorial note: This is the second of a two-part tutorial on reverse engineering executables. Today, we’ll walk through the process of analyzing a series of assembly instructions. These instructions implement the codewheel verification check from the 1989 game “Neuromancer”. We … Continue reading
Posted in Reverse Engineering
Comments Off
Neuromancer Codewheel – Part 1
Editorial note: This is the first of a two-part tutorial on reverse engineering executables. Today, we’ll walk through the process of finding the section of an executable responsible for performing a certain task, and next week we’ll analyze the assembly … Continue reading
Posted in Reverse Engineering
Comments Off
Quickie – Neuromancer
I’ve been working on a longer, reverse-engineering piece about Neuromancer, but couldn’t get it finished in time to post this week. In it’s place, a simple javascript implementation of the game’s code wheel.
Posted in Reverse Engineering
Comments Off
Memory Dumps from DOS DEBUG
As I’ve mentioned before, I like to use the DOS DEBUG command to investigate older 16-bit programs. Today, I present a brief guide to using that tool to take snapshots of running programs.
Posted in Reverse Engineering
Comments Off
Isometric Graphics w/JS & HTML
As an experiment, I decided to see if I could approximate a Flash game in JavaScript and HTML (without using the non-standard CANVAS tag). It turns out to be pretty easy to replicate an isometric display using some simple 2D … Continue reading
Posted in Projects, Reverse Engineering
Comments Off
Extracting bitmaps from Flash
Flash content is pretty common on the Web, but it is considerably less transparent than traditional HTML-based content. Whereas HTML-based content is built from human-readable script files and URL resource definitions, Flash content is locked inside a binary file format. … Continue reading
Posted in Reverse Engineering, Web stuff
Comments Off
File and Memory Offsets with DOS DEBUG
I often use the DOS DEBUG command to investigate older 16-bit programs; while there are doubtless better tools, DEBUG is ubiquitous and effective. There are many guides to its operation, but here I focus on a specific and practical question: … Continue reading
Posted in Reverse Engineering
Comments Off
1985 Data Structures (Hacker)
Editorial note: I enjoy poking around the innards of old computer games. I think it’s interesting to learn how the things worked, especially since they often had to cope with formidable resource restrictions. This is one of an occasional series … Continue reading
Posted in Reverse Engineering
Comments Off