The Morris worm of 1988 was one of those industry-shaking experiences that revealed how quickly a worm could spread using a vulnerability known as a buffer overflow or buffer overrun. Around 6,000 of ...
There are two types of memory modes offered by the eZ80 CPU. This application describes the types of memory modes, and provides a simple application to demonstrate how to properly configure the eZ80 ...
In the first installment of this series we had a brief look at the steps needed to get a bare-metal application running on an STM32 microcontroller. While this allowed us to quickly get to the juicy ...
Segements are a nasty evil, and their usage varys depending on what mode you are in.<br><br>In Real (8086) mode, the processor uses segments as part of its memory addressing routines. A segment is a ...