home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.lang.asm.x86      Ahh, the lost art of x86 assembly      4,675 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 3,053 of 4,675   
   Rick C. Hodgin to Rod Pemberton   
   Re: Sandsifter software finds hidden ins   
   07 Nov 17 18:40:27   
   
   From: rick.c.hodgin@nospicedham.gmail.com   
      
   On Tuesday, November 7, 2017 at 5:21:35 PM UTC-5, Rod Pemberton wrote:   
   > On Mon, 6 Nov 2017 17:53:15 -0800 (PST)   
   > "Rick C. Hodgin"  wrote:   
   >   
   > > On Monday, November 6, 2017 at 8:50:12 PM UTC-5, Rod Pemberton wrote:   
   >   
   > > > I'm not able to run the code even though I have Linux.   
   > > > The project requires some software or upgrades I don't have.   
   > >   
   > > Create a virtual machine and install a modern Linux kernel that it   
   > > does run on.  It will find all opcodes there.   
   > >   
   >   
   > Won't that find the opcodes the virtual machine emulates? ...   
      
   That's the absolute beauty of Christopher Domas's solution.  In order   
   for the VM to emulate instructions that are not allowed in the VM, it   
   must first decode the instruction to identify its rights.   
      
   Using this solution, from RING 3, you can identify every instruction   
   the architecture knows, including all RING 2, RING 1, and RING 0   
   instructions, as well as RING -1 (hypervisor) and RING -2 (SMM) code.   
      
   This solution by Domas is one of the most brilliant algorithms I've   
   ever seen.  The man's a genius.   
      
   --   
   Rick C. Hodgin   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca