Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Ten Cyber Security Tips for 2022
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Ten Cyber Security Tips for 2022
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
How-to /
A Quite Obscure C128 Video Mode Hack

A Quite Obscure C128 Video Mode Hack

May 7, 2019 10:00 pm How-to 220

30 years ago, [Dave] found himself up a C128D creek without a paddle. His main monitor was on the fritz, and he needed to use his C128D in 40-column mode to run old C64 programs for development purposes. Normally this is only possible through the low quality composite out, but no composite monitor was available. Needs must, so he got to coding a workaround that would allow the C128D to output in 40 column mode through the higher-quality RGBI output. 


Read more for full article!



Support the originator by clicking the read the rest link below.
quite obscure video
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
hackaday.com
A Defensive Malware On The Cyber To-Do List of Japanese Government
Prev
A Defensive Malware On The Cyber To-Do List of...

Related News

  • Yandex Source Code Online Leaked, Company Denies Hack
    Yandex Source Code Online Leaked, Company...
  • Riot Games Latest Video-Game Maker to Suffer Breach
    Riot Games Latest Video-Game Maker to Suffer...
  • Zacks Investment Research Hack Exposes Data for 820K Customers
    Zacks Investment Research Hack Exposes Data for...
  • 5 valuable skills your children can learn by playing video games
    5 valuable skills your children can learn by...
  • Hybrid play: Leveling the playing field in online video gaming and beyond
    Hybrid play: Leveling the playing field in...
  • Olivia Hack Reveals What Happened | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker
    Olivia Hack Reveals What Happened | #hacking |...
  • RP2040 DMA Hack Makes Another ‘CPU Core’
    RP2040 DMA Hack Makes Another ‘CPU Core’
  • Mailchimp Hit By Another Data Breach Following Employee Hack
    Mailchimp Hit By Another Data Breach Following...
  • Clerk of Court office back to normal after hack | News | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker
    Clerk of Court office back to normal after hack...
  • Hack the Pentagon 3.0: Groundbreaking Bug Bounty Program Is Back
    Hack the Pentagon 3.0: Groundbreaking Bug...
1 Bitcoin Exchange Outflows Reach Highest Value Since FTX Crash, Bullish?
Bitcoin Exchange Outflows Reach Highest Value Since FTX Crash, Bullish?
How to synchronize two Microsoft SharePoint lists using one Microsoft Power Automate flow
2 How to synchronize two Microsoft SharePoint lists using...
Litecoin (LTC) Displays Consolidation – Can We Expect A Reversal Soon?
3 Litecoin (LTC) Displays Consolidation – Can We Expect A...
FTX creditors list, BlockFi $1.2B exposure and new Celsius token: Hodler’s Digest, Jan. 22-28
4 FTX creditors list, BlockFi $1.2B exposure and new...
BrandPost: Understanding Device and Infrastructure Attacks: Exploring the Microsoft Digital Defense Report 2022
5 BrandPost: Understanding Device and Infrastructure...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!