Quantcast
Channel: Ken Shirriff's blog
Browsing all 318 articles
Browse latest View live
↧

Hippies, clever hardware and Steve Jobs' body odor: Visiting Apple in 1976

A guest posting from William Fine: I saw the "Jobs" movie yesterday and it revived some ancient memories of my dealings with Jobs and Holt in the "old days"! When I returned home, I researched Rod Holt...

View Article


Image may be NSFW.
Clik here to view.

Reverse-engineering and simulating Sinclair's amazing 1974 calculator with...

I've reverse-engineered the Sinclair Scientific calculator. The remarkable thing about this calculator is they took a simple 4-function calculator chip and reprogrammed its 320-instruction ROM to be a...

View Article


Image may be NSFW.
Clik here to view.

Reverse-engineering the 8085's decimal adjust circuitry

In this post I reverse-engineer and describe the simple decimal adjust circuit in the 8085 microprocessor. Binary-coded decimal arithmetic was an important performance feature on early microprocessors....

View Article

9 Hacker News comments I'm tired of seeing

As a long-time reader of Hacker News, I keep seeing some comments they don't really contribute to the conversation. Since the discussions are one of the most interesting parts of the site I offer my...

View Article

Image may be NSFW.
Clik here to view.

Reverse-engineering the Z-80: the silicon for two interesting gates explained

I've been reverse-engineering the Z-80 processor, using images from the Visual 6502 team. One interesting thing about the Z-80's silicon is it uses complex gates with multiple inputs and multiple...

View Article


Image may be NSFW.
Clik here to view.

Intel x86 documentation has more pages than the 6502 has transistors

Microprocessors have become immensely more complex thanks to Moore's Law, but one thing that has been lost is the ability to fully understand them. The 6502 microprocessor was simple enough that its...

View Article

Image may be NSFW.
Clik here to view.

The Z-80 has a 4-bit ALU. Here's how it works.

The 8-bit Z-80 processor is famed for use in many early personal computers such the Osborne 1, TRS-80, and Sinclair ZX Spectrum, and it is still used in embedded systems and TIgraphingcalculators. I...

View Article

Image may be NSFW.
Clik here to view.

The Z-80's 16-bit increment/decrement circuit reverse engineered

The 8-bit Z-80 processor was very popular in the late 1970s and early 1980s, powering many personal computers such as the Osborne 1, TRS-80, and Sinclair ZX Spectrum. It has a 16-bit...

View Article


Image may be NSFW.
Clik here to view.

How Hacker News ranking really works: scoring, controversy, and penalties

Update (11/18): article on penalties is penalized Ironically, this article was penalized on Hacker News. Minutes after reaching the front page, a heavy 0.2 penalty was applied to the article, forcing...

View Article


Image may be NSFW.
Clik here to view.

Bitcoins the hard way: Using the raw Bitcoin protocol

.gist table.lines { font-size: 12px; } .gist-data { max-height: 350px; } .gist-meta { font-size: 80% !important; } .tx { border-collapse: collapse; } .tx td { padding: 5px; border: 1px solid #ccc; }...

View Article

Bitcoin transaction malleability: looking at the bytes

.tx { border-collapse: collapse; } .tx td { padding: 5px; border: 1px solid #ccc; } .tx td { white-space: nowrap; font-family: sans-serif; } .tx td:last-child { white-space: normal; font-size: 80%;...

View Article

Image may be NSFW.
Clik here to view.

The Bitcoin malleability attack graphed hour by hour

I have a new Bitcoin article: Hidden surprises in the Bitcoin blockchain The Bitcoin network was subject to a strange attack this week. Up to 25% of the recorded transactions were modified using a...

View Article

Image may be NSFW.
Clik here to view.

Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson...

.gist table.lines { font-size: 12px; } .smallscript .gist-data { max-height: 150px; } .gist-meta { font-size: 80% !important; } pre.box { border: none; } Every Bitcoin transaction is stored in the...

View Article


Image may be NSFW.
Clik here to view.

Bitcoin mining the hard way: the algorithms, protocols, and bytes

.gist table.lines { font-size: 12px; } .smallscript .gist-data { max-height: 150px; } .gist-data { max-height: 350px; } .gist-meta { font-size: 80% !important; } .mining { border-collapse: collapse; }...

View Article

Image may be NSFW.
Clik here to view.

The programming error that cost Mt Gox 2609 bitcoins

In October 2011, Mt Gox lost over 2609 bitcoins by accidentally creating transactions that can never be redeemed. (At the time, 2609 bitcoins were worth about $8000, but they would be worth almost $1.5...

View Article


Image may be NSFW.
Clik here to view.

iPad charger teardown: inside Apple's charger and a risky phony

div.ipad-img { position:relative; display:inline-block; } div.ipad-label { position:absolute; top: 5px; left: 5px; color: #444; font-size: 18px; font-family: arial; } This article is now available in...

View Article

Image may be NSFW.
Clik here to view.

Reverse-engineering the TL431: the most common chip you've never heard of

A die photo of the interesting but little-known TL431 power supply IC provides an opportunity to explore how analog circuits are implemented in silicon. While the circuit below may look like a maze,...

View Article


Image may be NSFW.
Clik here to view.

Reverse engineering a counterfeit 7805 voltage regulator

Update: It turns out my 7805 isn't counterfeit. eclectro did an in-depth search (details on reddit) and found an old 7805 datasheet from Thomson Semiconductors that exactly matches my chip. And Thomson...

View Article

Image may be NSFW.
Clik here to view.

Why the Z-80's data pins are scrambled

If you look closely at the datasheet for a Z-80 chip, you'll notice the data pins are in a random-looking order. The address pins (A) are nicely arranged in order counterclockwise from 0 to 15, but the...

View Article

Image may be NSFW.
Clik here to view.

Mining Bitcoin with pencil and paper: 0.67 hashes per day

I decided to see how practical it would be to mine Bitcoin with pencil and paper. It turns out that the SHA-256 algorithm used for mining is pretty simple and can in fact be done by hand. Not...

View Article
Browsing all 318 articles
Browse latest View live