Deleaker is a tool for Windows that helps you fix memory leaks quickly and never worry about hours of hunting memory bugs.| thatonegamedev.com
Waveshare RP2350-PiZero is an update of the RP2040-PiZero, keeping the Raspberry Pi Zero form factor, but replacing the RP2040 MCU with the more powerful| CNX Software - Embedded Systems News
Dive into the world of C generics, exploring how to write flexible, type-safe code without the pitfalls of traditional macro-based solutions. Learn about modern techniques to achieve generic programming in C.| thatonegamedev.com
After we discovered the first vulnerability in October 2024, wolfSSL challenged us to uncover additional issues in their library. Using AI-automated fuzzing, we identified two more vulnerabilities.| www.code-intelligence.com
Scope of the project If you recognize the benefits that fuzz testing can bring to your software security but are new to it, read on. In this blog post, you’ll learn what you need to consider before implementing fuzz testing in your company to ensure a smooth and successful adoption.| Code Intelligence Blog
Learn how fuzzing complements static analysis when testing automotive software| www.code-intelligence.com
Memory safety vulnerabilities remain among the most widespread and exploited security issues. They occur in C and C++ projects, which are widely used across embedded systems, including automotive, medical devices, and avionics. Read on to learn why they can happen and how to prevent them. Content What Are Memory Safety Issues Why Memory Safety Matters Real-World Examples of Memory Corruption Example of a Memory Safety Bug How to Detect Memory Corruption| Code Intelligence Blog
While the intent of MDR is clear—to raise the safety bar for medical devices across Europe—the implementation has left manufacturers with significant uncertainty. Cybersecurity isn't an exception. What standards should you follow? Is fuzz testing becoming a de facto requirement? Let’s break it down.| www.code-intelligence.com
A dynamic stack buffer overflow vulnerability in the Abseil C++ library (abseil-cpp) was autonomously identified through AI-enhanced fuzz testing using CI Fuzz’s AI Test Agent. Learn more in this blog.| www.code-intelligence.com
A critical heap buffer overflow vulnerability in the AWS C Common library was discovered autonomously through an AI-automated fuzz testing solution, CI Fuzz, and has been fully addressed with a patch. In this post, we explore the vulnerability and its potential impact on embedded systems.| Code Intelligence Blog
We examined the 2024 CWE Top 25 Most Dangerous Software Weaknesses list developed by Common Weakness Enumeration (CWE™) and identified weaknesses relevant to C/C++. These weaknesses can become vulnerabilities. We explained how they occur and how you can uncover them.| www.code-intelligence.com
We’re thrilled to announce the general availability of Spark, an AI Test Agent that lowers the entry barrier to white-box fuzz testing. In this blog, we explain how Spark works and share the main results from its beta testing that prove its effectiveness.| Code Intelligence Blog
More on MMO Architecture:- MMO Architecture: Source of truth, Dataflows, I/O bottlenecks and how to solve them- MMO Architecture: client connections, sockets, threads and connection-oriented server…| PRDeving
In this article, I will mention 3 great websites to learn how to create your shaders in GLSL that you shouldn't miss out on!| That One Game Dev
📜 Intrinsics are like a recipe for the most optimized code that you can write to achieve certain behavior.| That One Game Dev
I have some interest in photogrammetry, and, more concretely, in the ways to extract 3D information from a set of photographies of an object. There is excellent open source software that is able to do this, like Meshroom, which is based on the Alice Vision framework. Once you create a 3D object with this tool, … Continue reading "A MeshLab plugin to find optimal oriented bounding boxes"| Alfonso Sánchez-Beato's blog
Occasionally I find myself processing input data which arrives as a stream, like data from files or from a socket, but that has a known structure that can be modeled with C types. For instance, let’s say we are receiving from a socket a parcel that consists on a header of one byte, and a payload that is an integer. A naive way to handle this is the following (simplified for readability) code snippet:| Alfonso Sánchez-Beato's blog
FlatBuffers is a serialization library developed by Google. In this article I will talk a bit more about them and about binary serialization.| That One Game Dev
In this article I will discuss what binary serialization is and the difference between that and a more typical JSON or XML serialization.| thatonegamedev.com
In this one I teach a lot about data serialization using FlatBuffers. Data serialization is an advanced topic that shouldn't be neglected.| thatonegamedev.com
This is my third course on Udemy and it will teach you the Vulkan specification so that you can render graphics on the screen.| thatonegamedev.com
In this article I will explore what is Vulkan and what is the concept behind the specification as well as its advantages.| thatonegamedev.com
In this article you will learn more about what ImGui is and why you should use it in your next project.| thatonegamedev.com
I created my second course. In this one I teach a little bit about graphics programming but mostly focusing on the UI programming with ImGui.| thatonegamedev.com
Over the last several months there has been noticeable and growing pain associated with the evolving integration tests around snapd, and given the project goal of being a cross-distribution platform, we are very keen on solving this problem appropriately so … Continue reading →| Labix Blog
The year is 2023 and you’re asking “What’s new in C?” Surely the answer is “absolutely nothing”, right?| Ruminations
One of the lesser-known features of C++11 is the fact that you can overload your non-static member functions based on whether the implicit this object parameter is an lvalue reference or an rvalue reference by specifying a functions ref-qualifier. This feature works similar to the way cv-qualifiers work when specifying a method must be called on a const or volatile object, and can in fact be combined with cv-qualifiers.| Ruminations
In C++, there are two forms of binary operator overloading you can use when designing an API. The first form is to overload the operator as a member function of the class, and the second form is to overload the operator as a friend function of the class. I want to explore why you would use one form of overloading instead of the other, using a Fraction class as an example.| Ruminations
I recently read a post by Phillip Larkson where the C preprocessor was used to implement a four-bit adder entirely at compile time. This got me wondering whether I could implement the same concept using C++ template metaprogramming. It seemed theoretically possible as all the components can be calculated at runtime, but I wanted to avoid making use of the preprocessor for anything but supplying the original values to be added. The goal was to compile something on the command line like: | Ruminations
The expression used in a sizeof operator is an unevaluated expression in C and C++. This can make for some surprising situations if you are unaware of it. For instance:| Ruminations
One of the lesser-known features of Visual Studio’s C/C++ compiler are the pointer type attributes __ptr32 and __ptr64. More information about them can be found on MSDN. These pointer type attributes are used to control the visible size and behavior of pointers in 32- and 64-bit applications. Their usage is a bit strange, but if you need to do interop between 32- and 64-bit mode, they can be handy features to have. Additionally, there are the __sptr and __uptr qualifiers which allow you...| Ruminations
Variable argument lists are very arcane in the world of C. You’ll see them expressed in function signatures as … at the end of the parameter list, but you may not understand how they work or what they do.| Ruminations
Vendor binder services proved to be an interesting part of android devices nature. They usually remains close-source, but sometimes open new attack surface for privilege escalation. In these articl…| Flanker Sky
13 May 2018| dirtyhandscoding.github.io
Descripción del proyecto Este proyecto lo creé en el año 1999. La idea era crear un lenguaje de programación para poder accionar robots o periféricos…| Entero Positivo