2025-09-16
1850 words
9 minutes
No tag
Matteo Medaglia
What is steganography and how it could be used to hide and retrieve information ? This article will use the example of a PNG file.
Minecraft, un des jeux-vidéos les plus populaires, utile en GISTRE
Quand un pilote appuie sur un bouton de son volant de F1, que se passe-t-il réellement ? Plongée dans l’univers des systèmes embarqués critiques : de la détection mécanique au bus CAN, en passant par l’ECU et les contraintes temps réel. Une course contre la montre où chaque microseconde compte.
Discuss about the evolution of the 3D printers and what’s coming next.
This article follows the journey of a USB flash drive from physical connection to user integration.
A tutorial on how to make a physics engine from 0 using basic physics theory and Verlet integration
The DWARF debugging Format Requirements For this article we will be using a few different programs to do some tests on the debugging format.
To replicate the examples in this article you need:
gcc or clang a nice and simple C program readelf and objdump During this article we will be using gcc and clang to compare and do a few experiments. To generate debugging information, you can use the -gdwarf flag in the two compilers to get an ELF file with the right DWARF debugging info in it.
I recommend also using -O0 to avoid any problems with optimized out sections of code.
A Hardware vulnerability in DRAM and its actual solution
This article goes over the evolution of the hardware graphics pipeline on GPUs across the different game console generations.
This article goes over the evolution of the hardware graphics pipeline on GPUs across the different game console generations.