Get the latest tech news

Below MI – IBM i for hackers


Version: 2024-06-30 (6102eb0ac438ba9de02e81426d15844269720579) IBM i is a vertically integrated system, where the vendor has full control over both hardware and software from the operating system to the CPU. The tight control over the platform allowed IBM to create a completely abstract development environment, so applications can become truly independent from the underlying hardware, implementing full backwards compatibility.

The tight control over the platform allowed IBM to create a completely abstract development environment, so applications can become truly independent from the underlying hardware, implementing full backwards compatibility. Since handling a trap at every valid pointer load would likely have detrimental performance cost, td likely has undocumented behavior supporting segment boundary checks. After the single td instruction was patched, S2DBG allows reading and writing arbitrary memory, including segments belonging to QSECOFR (page protections still apply though).

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Hackers

Hackers

Photo of mi – ibm

mi – ibm

Related news:

News photo

Hackers exploit critical D-Link DIR-859 router flaw to steal passwords

News photo

Hackers target new MOVEit Transfer critical auth bypass bug

News photo

Hackers Grow More Sinister and Brazen in Hunt for Bigger Ransoms