Many embedded Linux systems use a Wayland compositor like Weston for window management. Qt applications act as Wayland clients. Weston composes the windows of the Qt applications into a single wind…| Burkhard Stubert
Once we have removed an item from a BitBake variable, we cannot re-append it. The evaluation of the following three assignments of the variable BB_VAR yields the same result, no matter in which ord…| Burkhard Stubert
According to Annex I Part II of the EU CRA, manufacturers must actively search for vulnerabilities in their embedded devices, fix them and publicly disclose them to their users and the cybersecurit…| Burkhard Stubert
When developing the operator terminals for their machines, OEMs must reinvent the wheel over and again. Each OEM implements home-grown solutions for standard features like OTA updates, user authent…| Burkhard Stubert
Which devices are covered by the EU Cyber Resilience Act (EU CRA)? An X-ray fluorescence (XRF) analyser connected with the Internet over WiFi. A metal-sheet bending machine with an Ethernet port, w…| Burkhard Stubert
Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security| blog.k3170makan.com
In this post I'm going to run through a crash course about UART, and write up some personal notes I use to find them quickly and dump shells on embedded devices. So is going to be a little informal at times but the aim of the post is to get the tips and process across quickly so those who want to can get to dumping shells too! So this focused on supporting the activity of interacting with UART ports as they appear on an average IoT device. | k3170
This post is part of a series on the ELF format, if you haven't checked out the other parts of the series here they are:| k3170
Hi folks, this post is part of a series about the ELF format. So far in this series we have:| k3170
Hi folks! This post is part of a series I'm covering on the ELF format. In this one I'm going to discuss the section headers and unpack how they work.| k3170
Welcome back folks! In the previous post I covered pretty much the most trivial parts of the ELF file format. In this post we are actually going to work with one of the most interesting mechanisms in the file - the program headers! I skipped some parts of the ELF header in the previous post and decided to cover them here specifically because they inform on the Program Headers anyway. Lets get started!| k3170
Do you have a requirement to measure the voltage, current and power drawn from a battery or by a device using a Raspberry Pi? | Beyondlogic
We can build the Qt versions from 6.2 to 6.5 with the meta-qt6 layer for the Yocto versions 3.1 to 4.1. This is a big time saver.| Burkhard Stubert