The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 31: | Line 31: | ||
We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us! | We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us! | ||
== | == Events == | ||
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] | * [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] | ||
Line 47: | Line 43: | ||
* [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck] | * [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck] | ||
* [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)] | * [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)] | ||
== Can be also found == | == Can be also found == |