Event JSON
{
"id": "4890e53ca9926af058e7dec9a58f8fdd7973afe87a6ec2b4628674a8457274d8",
"pubkey": "da48c5d0523a83ddf35f5fd7b4916857ccac6c1b16853fa301641ed117991b11",
"created_at": 1718028443,
"kind": 1,
"tags": [
[
"t",
"osnews"
],
[
"proxy",
"https://mstdn.social/@osnews/112592712070587087",
"web"
],
[
"proxy",
"https://mstdn.social/users/osnews/statuses/112592712070587087",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mstdn.social/users/osnews/statuses/112592712070587087",
"pink.momostr"
]
],
"content": "Reverse-engineering MenuetOS 64: primary boot loader\n\nNow that we have the MenuetOS 64 disk image file (M6414490.IMG), it is time to analyze! We will analyze the image file both statically and dynamically. Static analysis is reading and analyzing code without running it, whereas dynamic analysis is running the code and watching how it changes registers and memory during execution. Each \n\nhttps://www.osnews.com/story/139918/reverse-engineering-menuetos-64-primary-boot-loader/\n\n#OSNews",
"sig": "0c1e9131ca5ff68925440bde9e0f98ab385ebfca571d8d61550bd9e2ad0920be89a6a68629800c563504a9e897e1bf0117d65105799317f090fb8946a8f06f67"
}