PIC32 DMA is a Weird Machine

Direct memory access (DMA) systems in computers are more powerful than you might think, and [Bruce Land] and [Joseph Primmer] have done some clever hacking to take full advantage of this on the PIC32 microcontrollers. This is a cool proof-of-concept hack — you can do general computing in the DMA …read more

Continue reading PIC32 DMA is a Weird Machine

PIC32 DMA is a Weird Machine

Direct memory access (DMA) systems in computers are more powerful than you might think, and [Bruce Land] and [Joseph Primmer] have done some clever hacking to take full advantage of this on the PIC32 microcontrollers. This is a cool proof-of-concept hack — you can do general computing in the DMA …read more

Continue reading PIC32 DMA is a Weird Machine

Bitluni Brings All the ESP-32 Multimedia Hacks to Supercon

Of all the people I was looking forward to meeting at Supercon, aside from my Hackaday colleagues with whom I had worked for five years without ever meeting, was a fellow from Germany named Matthias Balwierz. The name might not ring a bell, but he’ll certainly be familiar to Hackaday …read more

Continue reading Bitluni Brings All the ESP-32 Multimedia Hacks to Supercon

How Many LEDs Can You Drive?

Driving more than a handful of LEDs from a microcontroller is often a feat that takes tedious wiring, tricking the processor, or a lot of extra external hardware. Charlieplexing is perhaps the most notorious of these methods, and checks two of those three boxes. This library for the Teensy 4.0 …read more

Continue reading How Many LEDs Can You Drive?

The Multiyear Hunt for a Gameboy Game’s Bug

[Enddrift] had a real problem trying to run a classic game, Hello Kitty Collection: Miracle Fashion Maker, into a GBA (Gameboy Advance) emulator. During startup, the game would hit an endless loop waiting for a read from a non-existent memory location and thus wouldn’t start under the emulator. The problem …read more

Continue reading The Multiyear Hunt for a Gameboy Game’s Bug

Eclypsium Researchers Demonstrate Direct Memory Attacks

Researchers from Eclypsium, a provider of secure firmware, disclosed this week that they have been able to launch successful direct memory access (DMA) attacks that bypass security frameworks such as UEFI Secure Boot, Intel Boot Guard, HP Sure Start a… Continue reading Eclypsium Researchers Demonstrate Direct Memory Attacks

Thunderclap: Apple Macs at risk from malicious Thunderbolt peripherals

Researchers have revealed how malicious Thunderbolt and PCI Express (PCIe) peripherals could be used to compromise computers running macOS, Windows, Linux and FreeBSD. Continue reading Thunderclap: Apple Macs at risk from malicious Thunderbolt peripherals

Memory Mapping Methods in the Super Nintendo

Not only is the Super Nintendo an all-around great platform, both during its prime in the 90s and now during the nostalgia craze, but its relative simplicity compared to modern systems makes it a lot more accessible from a computer science point-of-view. That means that we can get some in-depth discussion on how the Super Nintendo actually does what it does, and understand most of it, like this video from [Retro Game Mechanics Explained] which goes into an incredible amount of detail on the mechanics of the SNES’s memory system.

Two of the interesting memory systems the SNES uses are …read more

Continue reading Memory Mapping Methods in the Super Nintendo

Consumers still happy to exchange data with businesses if there’s a benefit

Data privacy is the subject of much debate and discussion in the media. There has also been much speculation about the effects of recent changes to data privacy legislation and data breaches will have on consumers’ willingness to share their data. So, … Continue reading Consumers still happy to exchange data with businesses if there’s a benefit