• 4 Posts
  • 33 Comments
Joined 3 years ago
cake
Cake day: March 25th, 2022

help-circle






  • Faresh@lemmy.mltoProgrammer Humor@lemmy.mlOf course
    link
    fedilink
    English
    arrow-up
    0
    ·
    6 months ago

    Is there any situation where you’d want to remember the opcodes? Disassemblers should give you user-friendly assembly code, without any need to look at the raw numbers. Maybe it’s useful to remember which instructions are pseudo instructions (so you know stuff like jz (jump if zero) being the same as je (jump if equal) making it easier to understand the disassembly), but I don’t think you need to remember the opcode numbers for that.



  • Faresh@lemmy.mltoScience Memes@mander.xyzSpeed
    link
    fedilink
    English
    arrow-up
    21
    ·
    edit-2
    6 months ago

    I once lived with a sort of science skepticistdenier (didn’t believe in the moonlanding nor did he believe that the earth wasn’t flat). He was of the belief that scientists are deceiving the public and one of the examples he gave was that they claim that the earth rotates at 1 670 km/h but if we look outside that’s very clearly not the case and if jump we aren’t flung at that speed to the side. I spent half an hour in a back and forth trying to explain the concept of relative velocity and inertia. It didn’t go anywhere.

    Edit: changed to denier based on the comment by logos.





  • I wonder what sort of mitigations we can take to prevent such kind of attacks, wherein someone contributes to an open-source project to gain trust and to ultimately work towards making users of that software vulnerable. Besides analyzing with bigger scrutiny other people’s contributions (as the article mentioned), I don’t see what else one could do. There are many ways vulnerabilities can be introduced and a lot of them are hard to spot (especially in C with stuff like undefined behavior and lack of modern safety features) , so I don’t think “being more careful” is going to be enough.

    I imagine such attacks will become more common now, and that these kind of attacks could become very appealing for governments.









  • Faresh@lemmy.mltoProgrammer Humor@lemmy.mlC++ Moment
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    8 months ago

    That’s not true though. You can get the backtrace and other useful information from the coredump mentioned by the error message by loading it with gdb. Not as good as attaching it to a living process, since you can’t see step-by-step what happens leading up to the error, but still quite useful.