All Articles


  • Enabling ONOS Built-in Services

      Tags: computernetwork    
    In this exercise, you will integrate ONOS built-in services for link and host discovery with your P4 program. Such built-in services are based on the ability of switches to send data plane packets to the controller (packet-in) and vice versa (packet-out). To make this work with your P4 program, ...   Read More

  • Using ONOS as the Control Plane

      Tags: computernetwork     security    
    This post brings more details about the execution of Using ONOS as the Control Plane Tutorial that is part of the Next Generation SDN Tutorial. And it will cover the following topics: Start ONOS along with a set of built-in apps for basic services such as topology discovery Load a custom ON...   Read More

  • Yang, OpenConfig and gNMI

      Tags: computernetwork    
    This post brings more details about the execution of Yang, OpenConfig, and gNMI Basics Tutorial that is part of the Next Generation SDN Tutorial. And it will cover the following topics: Understanding the YANG language Understand YANG encoding Understanding YANG-enabled transport protocols...   Read More

  • KeePass Integration with AutoHotKey

      Tags: security     taskautomation    
    If you have to handle several passwords through some pass phrase manager like KeePass, I hope this post can help you to do less efort to get your passwords and bring it in a safe/secure way. To do that I propose a solution using KeePass and AutoHotKey tools, that will automate part of this proces...   Read More

  • Next Generation SDN - P4Runtime Basics

      Tags: computernetwork     security    
    This post brings more details about the execution of P4Runtime Basics Tutorial that is part of the Next Generation SDN Tutorial. This post will cover the following topics: Look at the P4 starter code Compile it for the BMv2 software switch and understand the output (P4Info and BMv2 JSON fil...   Read More

  • Buffer Overflow Through Vulnerable Program (Unix OS)

      Tags: reverseengineering     security    
    The following program is an example of insecure implementation that enable the user to inject shell commands during its execution. It uses the system() function that executes commands into the host environment through the command processor and it returns after the command has been completed. Sys...   Read More

  • Stack Overflow Explained

      Tags: reverseengineering     security    

  • Beaglebone Black - Soldering Jtag Connector

      Tags: hardware    
    The mostly goal in this article is to show how to soldering a JTAG connector in the Beaglebone Black (BBB) board, then in the next post I hope to show you how to connect it with J-Link Segger 8.08.90, at least if it works :). Otherwise, at least you can see here the pinout related to P2 connector...   Read More

  • Building NuttX for Beaglebone Black (BBB)

      Tags: embeddedsystems     digitalprocessing    
    To follow this tutorial (Linux), besides the Beaglebone Black (BBB), you will need a computer to build the NuttX OS, one microSD card, one serial-usb adapter and any serial software to interfaces with BBB. After complete the check list, is time to execute some commands. Setting up the Developme...   Read More

  • Control Systems - The Step Response

      Tags: control    
    In this post I want to cover some interesting things about step response and I hope to clarify via examples what the step response is and how it can be used to specify the design for closed-loop control systems, to do that I will use program laguage for Octave. So, to answer the question “What is...   Read More

  • Heterogeneous Co-Simulation - Software and Hardware

      Tags: embeddedsystems     digitalprocessing    
    The idea to write this post appeared some years ago when I was working as a FPGA Developer, I was amazed with the possibility to test my stuffs in a complete simulated environment, my goal here is make this tutorial simple and guided by practical exercise to clarify the co-simulation usage. When ...   Read More

  • State Chart XML SCXML - Generating C Code Using XMLStarlet

      Tags: embeddedsystems     softwaredevelopment    
    SCXML stands for State Chart XML: State Machine Notation for Control Abstraction. It is an XML-base markup language that provides a generic state-machine-based execution environment based on Harel statecharts.   Read More

  • Two-Wheeler balancing robot

      Tags: control    
    The 2-Wheeler Balancing Mechanical Kit is used to apply control laws related to inverted pendulum, with this mechanical kit I will start a serie related to control this kit. For this task I will use the Hercules LaunchPad, based on TMS-570 microcontrollers from Texas Instruments. In the next ima...   Read More

  • Tasks creation in Hercules LauchPad

      Tags: embeddedsystems    
    The Hercules TMS570LS04 LaunchPad Development Kit is an inexpensive evaluation platform designed to help usere and get started on development with Hercules microcontrollers platform.   Read More

  • Communication wireless using 3DR Telemetry Radio

      Tags: rf     embeddedsystems     control    
    The 3DR Radio is the easiest way to setup a telemetry connection between your autopilot and a ground station. Bellow you can see the simple test setup using a computer, any serial-usb adapter and a couple of telemetry radio, to prepare the setup you just need to connect the ground module directly...   Read More

  • Operational Amplifier Series - Comparator Circuit

      Tags: analogelectronic     embeddedsystems    
    From the datasheet, the LM741 can be operated in an open-loop configuration.The magnitude of the open-loop gain is typically large thus for a small difference between the non inverting and inverting input terminals, the amplifier output will be driven near the supply voltage. Without negative fee...   Read More

  • Reading XML Files in C++ (libxml2)

      Tags: softwaredevelopment    
    XML files could be very useful for many kind of application, as configuration storage, software interface, resource for code generator, etc.   Read More

  • Setting up Uncrustify Tool for Git Automation (C/C++ Languages)

      Tags: softwaredevelopment    
    Uncrustify is a tool used to fit a standard for a program language aplying style according to the configuration file, it turns the code as a standardized code. This tool is very used in cases of large projects that is difficult to disseminate a coding conventions or in cases of each team member u...   Read More

  • Investigating Car Key (RF Remote Control) With HackRF One - Part 1

      Tags: reverseengineering     security     rf    
    First of all, I would like to register that this post has no intention to teach how to break the laws, to ensure this I will omit the car model and suppress any other information that could open a window for malicius people. I want to mension that it is just a theme that should be developed for s...   Read More

  • Test Coverage Using Google Test, GCov and LCov

      Tags: softwaredevelopment    
    This post will describe a setup to start working with test coverage. First of all, I would like to highlight the GitHub link of this project BraveCoverage It is related to a very small piece of code to demonstrate how to start a project providing test coverage metrics. But why this is important?...   Read More

  • Base Project to Use GTest and GMock for Unit Tests

      Tags: softwaredevelopment     embeddedsystems    
    The goal of this post is to create a base to be used in all unit tests project that uses google test and google mock framework. Here I am configuring the environment for a Debian distribution and, of course, the commands below is valid only for distribution Debian based. So, first thing first, we...   Read More

  • VHDL - Two Logic Gates Analysis

      Tags: embeddedsystems     digitalprocessing    
    Firstly I would like to say that the following project is an initial example for who wishes start a work with VHDL, after read this example you will be able to simulate your first digital design in vhdl. The circuit below represents two logical gates “AND” and “OR”, and their corresponding input...   Read More

  • Reversing a BIOS Flash Via Hardware - First Steps

      Tags: reverseengineering     security    
    This brief tutorial about dumping the BIOS (Basic Input/Output System) content directly via hardware (Programmer MiniPro TL866), will pass to you the procedure executed to get BIOS binary code. Other articles of this blog will cover binary contents analysis and some modifications based on its dis...   Read More