Image of XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)
Image of RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302) (Certification Press)
Image of Beginning Google Maps API 3
Image of Android Wireless Application Development

Decrypt PROLiNK ADSL Modem Configuration File To Reveal Backdoor

In this post, I show you how to decrypt the configuration file for a very popular PROLiNK ADSL router modem. This revealed an undocumented backdoor account with elevated privileges and other interesting configuration options and settings.

Use 010 Editor to Obtain Header Fields From Intel Microcode Binary Files

In this post, I use an 010 Editor script and template to extract and display specific microcode header fields for a set of Intel microcode binary blobs.

Examining Intel Microcode in Lenovo Firmware Updates

This post demonstrates how to extract Intel microcode updates from a Lenovo firmware update using UEFItool and subsequently use an 010 Editor template to extract useful information from the extracted Intel microcode updates.

Nesting RHEL7 KVM on VMware Workstation 12

In this post I discuss how to enable a Red Hat Enterprise Linux VM to use KVM when installed on top of VMware Workstation version 8 or later.

How to Determine Hardware Mode of Intel CPU

Consider the following output: # grep flags /proc/cpuinfo flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx rdtscp lm constant_tsc pni monitor ssse3 lahf_lm How can you the maximum size of a long that can be used with this CPU? The answer is 64-bit because of the presence of the lm flag. The following flags can be used to determine the maximum size of a long for a CPU: lm – Long Mode (64 bits) tm – Protected mode (32-bit) rm – Real Mode