The broadband protocol stacks
The Broadband Forum as a lot of technical reports about the xDSL architecture but it is not so easy to find a good description of the global architecture. Those are ASCII-art protocol stack I inferred...
View ArticleBundler Starter Kit
Bundler is a tool to manage Ruby gem dependencies, install them and setup the execution environment. The homepage shows how to use it to install the gems alongside the ruby installation/systemwide...
View ArticleUpdating Firefox OS
I updated a Geeksphone Peak from Firefox OS 1.1 to Firefox OS 2.1 and it was not that easy.
View ArticleLogging message workflow with journald
A short summary of the logging message workflow with systemd-journald (and the different formats and sockets involved).
View ArticleVerifying authenticity of Debian CDs
The official guide for verifying the authenticity of a Debian 🍥 CD image is not so clear if you don't already have an idea about what you are doing. Here is a translation in terms of shell commands.
View ArticleAnatomy of an ELF core file
The Executable and Linkable Format (ELF) is used for compilation outputs (.o files), executables, shared libraries and core dumps. The first cases are documented in the System V ABI specification and...
View ArticleI can has systray?
In Plasma 5, support for the XEmbed-based “legacy” systray protocol was removed: only the new SNI protocol is handled. However, a lot of applications still do not handle the new protocol: Qt4 and Qt5...
View ArticleFTL data file
Faster Than Light (FTL) is a very nice (and quite difficult) rogue-like-ish game with space battles, teleporters, management of the energy of your ship, asteroid fields, alien species, droids (drones),...
View ArticleSimGridMC: The Big Split (and Cleanup)
In my previous SimGrid post, I talked about different solutions for a better isolation between the model-checked application and the model-checker. We chose to avoid the (hackery) solution based...
View ArticleThe ELF file format
Some notes on the ELF 🧝 file format with references, explanations and some examples.
View ArticlePrivate PostgreSQL instance
How to create a private on-demand PostgreSQL instance accessible only for the local user over UNIX socket.
View ArticleMultiple accounts with mutt
If you try to use mutt, you will wonder how you are supposed to handle multiple accounts. You will find suggestions to bind some keys to switch to different accounts, use hooks.
View ArticleDebugging use-after-free with RR reverse execution
RR is a very useful tool for debugging. It can record the execution of a program and then replay the exact same execution at will inside a debugger. One very useful extra power available since 4.0 is...
View ArticleDNS aggregation over TLS
In a previous post, I tried different solutions for tunnelling DNS over TLS. One of those solutions was using a dedicated DNS-over-UDP fake service replying to all queries with the truncate flag set:...
View ArticleNumber of lines of code with FlameGraph
FlameGraph is used to display stack trace samples but we can ue it for other purposes as well.
View ArticleIntel AMT discovery
There has been some articles lately about Intel Active Management Technology (AMT) and its impact on security, trust, privacy and free-software. AMT supposed to be widely deployed in newest Intel...
View ArticleC++ synchronisations for SimGrid
This is an overview of some recent additions to the SimGrid code related to actor synchronisation. It might be interesting for people using SimGrid, working on SimGrid or for people interested in...
View ArticleOpenSSH ProxyUseFdPass
While looking at the OpenSSH ssh_config manpage, I found the ProxyUseFdpass configuration I did not know about. It is apparently not widely known or used.
View Article