Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
How-to /
A Quite Obscure C128 Video Mode Hack

A Quite Obscure C128 Video Mode Hack

May 7, 2019 10:00 pm How-to 428

30 years ago, [Dave] found himself up a C128D creek without a paddle. His main monitor was on the fritz, and he needed to use his C128D in 40-column mode to run old C64 programs for development purposes. Normally this is only possible through the low quality composite out, but no composite monitor was available. Needs must, so he got to coding a workaround that would allow the C128D to output in 40 column mode through the higher-quality RGBI output. 


Read more for full article!



Support the originator by clicking the read the rest link below.
quite obscure video
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
hackaday.com
A Defensive Malware On The Cyber To-Do List of Japanese Government
Prev
A Defensive Malware On The Cyber To-Do List of...

Related News

  • INCOGNITO  mode is NOT safe.  #tech #cybersecuritycompany #networkattacks
    INCOGNITO mode is NOT safe. #tech...
  • Bitcoin chart pattern, return of ‘HODL mode’ point to imminent all-time BTC price high
    Bitcoin chart pattern, return of ‘HODL mode’...
  • Cetus Protocol Secures $500K Loan from Sui Foundation to Compensate Hack Victims, Vows Relaunch
    Cetus Protocol Secures $500K Loan from Sui...
  • New OpenAI Sora & Google Veo Competitor Focuses on Storytelling With Its Text-to-Video Tool
    New OpenAI Sora & Google Veo Competitor...
  • Ukraine strikes Russian bomber-maker with hack attack
    Ukraine strikes Russian bomber-maker with hack...
  • This palm recognition smart lock doubles as a video doorbell (and has no monthly fees)
    This palm recognition smart lock doubles as a...
  • Crypto crooks targeted $244M in May, hack losses down 40% — PeckShield
    Crypto crooks targeted $244M in May, hack...
  • Cetus Protocol Moves Forward with Recovery After Hack
    Cetus Protocol Moves Forward with Recovery...
  • This video doorbell camera has just as many features are my Ring - and no subscription required
    This video doorbell camera has just as many...
  • ConnectWise customers get mysterious warning about 'sophisticated' nation-state hack
    ConnectWise customers get mysterious warning...
1 Do you trust Xi with your 'private' browsing data? Apple, Google stores still offer China-based VPNs, report says
Do you trust Xi with your 'private' browsing data? Apple, Google stores still offer China-based VPNs, report says
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
2 Arsen Launches AI-Powered Vishing Simulation to Help...
Wanted: Junior cybersecurity staff with 10 years' experience and a PhD
3 Wanted: Junior cybersecurity staff with 10 years'...
Bitcoin Price Crash To $94,000 Imminent As Fibonacci Resistance Is At Stake
4 Bitcoin Price Crash To $94,000 Imminent As Fibonacci...
The Best VPNs for Cryptocurrency Trading and Buying Bitcoin in 2025
5 The Best VPNs for Cryptocurrency Trading and Buying...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!