About:

Georg's Log is a website authored by Georg, providing insights and content related to his interests and activities.

Website:

Specializations:

Outgoing Links:

Dan Luu
Subscribe to RSS:
The article discusses exploiting a flaw in a shell script to inject shell-code into a running shell interpreter. It covers the process of injecting code into a Linux process, the challenges involved, and the requirements for shell...
The text discusses a paper that proposes an improved nanosleep and the criticism it received from Thomas Gleixner, the Linux kernel maintainer. It also highlights the issues with the paper's 3rd preprint revision and the lack of a...

0Blocking Audio Ads

2024-06-16

The article discusses the challenge of blocking audio ads in podcasts and introduces a software solution called cutbynoise. It explains the motivation behind the need for ad-blockers and the difficulty in filtering ads in audio fi...

0Shift Typing

2023-10-07

The article introduces shift-tutor, a Linux program that filters shift key events to improve or verify touch typing skills. It discusses the rationale behind the shift keys on keyboards, the problems that may arise from underutili...
The article is a review of the Fosi Audio TDA7498E 2 channel amplifier. The author needed a small and efficient amplifier for connecting a pair of old 4 Ohm monitor boxes to a computer. The article discusses the selection process,...
The article discusses I2C addresses and presents two I2C address scanners for ATmega328p AVR and GD32VF103 RISC-V MCUs. It provides a high-level overview of I2C communication and explains the process of I2C address scanning. The a...
The article describes how to measure a pulse-width-modulated (PWM) signal using the Pokit Meter device. It discusses the limitations of the device, the Android application, and the oscilloscope mode. The article also mentions the ...
The text describes the GD32VF103 RISC-V microcontroller, its characteristics, development boards, assembling, connecting, powering, development environment, C++, interrupts, and the RTC. It also compares the GD32VF103 to other sim...
The text discusses the costs of syscalls and the methods used to measure the minimal costs of a syscall. It also presents the results and discussions of the benchmark, highlighting the costs of different syscalls and the impact of...

0The Rise of Meson

2021-08-07

The text discusses the rise of Meson as a build tool in open source projects, comparing it to CMake and other build tools. It provides data on the usage of Meson in Fedora packages over the years and highlights its growth. The aut...

0Perfect Hashing

2020-11-22

The article discusses the benefits of perfect hashing, particularly in minimizing item lookup latency jitter. It presents benchmarking results comparing libphashtable to a traditional hash table, showing that libphashtable yields ...
The article explains how to automate the setup of a Fedora system with an encrypted root filesystem remotely in the cloud using Ansible and a special Fedora rescue system. It discusses the motivation behind having an encrypted roo...
The article discusses the problem of deploying SSH host keys when deploying a Digital Ocean Droplet. It explains the issues with auto-generated SSH host keys and provides a solution using cloud-config and user-data parameter. It a...
The article discusses the RISC-V vector extension (RISC-V 'V') and its advantages over the average single-instruction multipe-data (SIMD) instruction set. It compares the two main different styles of vector ISAs, discusses a strin...
The text announces the launch of MANPATH.be, a site for convenient man page browsing. It provides access to man pages of different distributions, including Fedora, CentOS, and OpenSolaris. The author describes the motivation behin...
The text discusses the discovery of a malicious Firefox addon called 'ublock Ads Plus' that disguises itself as a legitimate ad-blocker. The author found that the addon contains malicious code that spies on the user, sends persona...

0Touch Typing

2018-12-15

The article discusses the benefits of touch typing, learning approaches, and optimization opportunities. It also covers advanced training, optimal layout, compose key, and ergonomic keyboards.
The text discusses the importance of setting up a Sender Policy Framework (SPF) DNS record to ensure that mail is accepted by Google mail servers. It explains the background of best practices for mail servers and the criteria used...

0Work-related Movies

2018-04-18

The article features a watch list of work-related movies that provide some peace of mind after working overtime. Each movie has a relation to a pathological work-related setting, often on a deeper layer of interpretation. The movi...
The text discusses the author's discovery of an old hard disk from a Solaris test system and the proof-of-concept for capturing user-entered passwords with DTrace. It explains the process of capturing passwords and the challenges ...