Categories

  • Cyber Security
  • Threat Intelligence
  • Technology
  • Cyber Security Videos
  • How-to
  • Ten Cyber Security Tips for 2021
  • Cyber Threat Maps
  • Our Mission
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Ten Cyber Security Tips for 2021
  • Cyber Threat Maps
  • Our Mission
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Technology
  • Cyber Security Videos
  • How-to
Home /
How-to /
A Quite Obscure C128 Video Mode Hack

A Quite Obscure C128 Video Mode Hack

May 7, 2019 10:00 pm How-to 122

30 years ago, [Dave] found himself up a C128D creek without a paddle. His main monitor was on the fritz, and he needed to use his C128D in 40-column mode to run old C64 programs for development purposes. Normally this is only possible through the low quality composite out, but no composite monitor was available. Needs must, so he got to coding a workaround that would allow the C128D to output in 40 column mode through the higher-quality RGBI output. 


Read more for full article!

quite obscure video
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest at
hackaday.com
A Defensive Malware On The Cyber To-Do List of Japanese Government
Prev
A Defensive Malware On The Cyber To-Do List of...

Related News

  • Sunbust avoided indicators of compromise with SolarWinds hack, but left breadcrumbs | SC Media
    Sunbust avoided indicators of compromise with...
  • After big hack of U.S. government, Biden enlists 'world class' cybersecurity team
    After big hack of U.S. government, Biden...
  • The SolarWinds Hack And The Future Of Cyber Espionage - CNBCAfrica.com
    The SolarWinds Hack And The Future Of Cyber...
  • Biden Orders Intel Agencies to Provide Full Assessment of SolarWinds Hack
    Biden Orders Intel Agencies to Provide Full...
  • Video Chat Apps Vulnerability | Avast
    Video Chat Apps Vulnerability | Avast
  • Defense Secretary Nominee Says Hack Perpetrators ‘Should be Held Accountable’
    Defense Secretary Nominee Says Hack...
  • FireEye Releases New Open Source Tool in Response to SolarWinds Hack
    FireEye Releases New Open Source Tool in...
  • Remoticon Video: Learning the Basics of Software-Defined Radio (SDR)
    Remoticon Video: Learning the Basics of...
  • Livecoin slams its doors shut after failing to recover from hack, financial loss
    Livecoin slams its doors shut after failing to...
1 How to use Infosec Skills | Hands-on cybersecurity training
How to use Infosec Skills | Hands-on cybersecurity training
Is Your Security Team Cloud Ready?
2 Is Your Security Team Cloud Ready?
Verimatrix launches enhanced Application Protection service for Android - Help Net Security
3 Verimatrix launches enhanced Application Protection...
Does your cloud stack move faster than your cloud security solutions? - Help Net Security
4 Does your cloud stack move faster than your cloud...
Laptops given to British schoolkids came preloaded with malware and talked to Russia when booted
5 Laptops given to British schoolkids came preloaded with...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!