I know this is a weird question, but I want to get the “initscr” function error mentioned by the doc (getting invalid pointer and an error message on stderr) to test if a wrapper works properly. But I don’t find any information about that. I’m currently working with ncurses 6.2. After few research, I have found that the invalid pointer
Tag: reverse-engineering
why virtual address of LOAD program header and runtime virtual address shown by gdb is different?
I’ve been trying to understand elf file format and on elf format documentation, VirtAddr of LOAD header should be the virtual address of the loaded segment. But gdb memmap shows segments to be loaded at different virt address. gdb memmap Answer VirtAddr of LOAD header should be the virtual address of the loaded segment. This is only true for ELF
Is there a way to retrieve the script path called by a user-defined command?
I’m a newbie in GNU/Linux and, for a project, I need to do some reverse engineering. At a given line in a script, there is a command: I’m almost sure the “dc” command was previously added to the path/simlink/(?) by a previous developper. When executed, the command allows to run a simulation over the case indicated by the PATH. Yet,
dev/ttyO0 used in AR Drone 2.0 – Reverse Enginnering
I read an interesting article about coding for the AR Drone 2.0 from Parrot. In this code they us nodeJS to talk to the drone. Therefore the code starts out with creating a Stream to /dev/ttyO0 I am starting out to learn more about the background of linux functionalities and would like to know: How do you initially find out