
Back to Basics: Why do we return 0?
There is a very high chance that if you read my blog, you’ve seen the line of code return 0; at some point. Specifically, you’ve probably seen it in a main() function, like so:
int main()
{
//Do stuff
return 0;
}
Why, though? Can I return something that isn’t zero?
The simple answer is yes. main() is, after all, a function and can return w...

Labelling: A Pandemic of Our Generation
A while back I read about something called the “labelling theory”. The labelling theory suggests that an individual’s identity and behaviour may be determined by the terms that are used to describe them by others (i.e. labelling). This theory, for example, states that if you keep calling someone a criminal, they will eventually become an actual ...

Reverse Engineering 101: Dissecting Software
Reverse engineering… Could it be just the opposite of engineering? Is it that simple? Let’s see!
Reverse engineering is a very broad field which has lots of applications. Not just that, but almost anything can be reverse engineered too. Let’s take a look at it in this post.

The Life of a Binary: From LoC to a PID
Programs… Binaries… PE Files… ELF Files… What are those? If you’ve read about computers at some point or even just used them, you’ve probably come across these terms. Today we’ll take a look on how programs are built and the stages they go through.

Shield Yourself: Five Tips to Strengthen your Online Security
I could talk for the entirety of this post about how connected we are and how much we rely on the internet and technology and all that stuff but I am pretty sure we all know that. So, let’s just get straight to the point. The fact is that most people have horrible online security habits.

PS/2 vs USB, FIGHT!
Last month, I published 3 blog posts on how computers work on a low level from a hardware perspective. Such a low level, that we created an entire computer on breadboards. Now, you may be wondering how do we interact with a computer? Well, you already know how computers execute instructions to process values in memory and you’ve probably used a ...

The 4043 - Part 3: Days 8 to 10, Well, how do they understand instructions?
In the last two posts, we covered quite a bit of the von Neumann architecture and how The 4043 breadboard computer maps to it. This is the third post in a 3-part series on computer architecture

The 4043 - Part 2: Days 5 to 7, But, how do they execute code?
In the last post, we talked a bit about computer architecture and how computers generally work. We also got to know a little about how the 8Bit breadboard computer maps to all of that, discussing the clock, registers, and ALU (checked in the image below).
33 post articles, 5 pages.