Oral Lecture Series | Reading Notes: The Application of 3D Printing in Digital Implant Guides

Oral Lecture Series | Reading Notes: The Application of 3D Printing in Digital Implant Guides

[Image] This is the 281st tweet from Luojia Morning Repair. 3D printing technology, also known as additive manufacturing (AM), allows designers to obtain three-dimensional digital models through volumetric imaging technology or reverse engineering (RE). The application of 3D printing in the field of dental implants has revolutionized the way we approach the creation of surgical … Read more

Is the Reverse Engineering of Publicly Sold Circuit Boards Detrimental to Non-Public Knowledge? Insights from the Supreme Court Case (2021) Zhi Min Zhong 1302 on the Protection of Trade Secrets

Is the Reverse Engineering of Publicly Sold Circuit Boards Detrimental to Non-Public Knowledge? Insights from the Supreme Court Case (2021) Zhi Min Zhong 1302 on the Protection of Trade Secrets

Word count: 2680, reading time approximately 14 minutes Basic Case Facts The plaintiff, Beijing Lingji Zhongsheng Technology Co., Ltd. (referred to as “Lingji Company”), is a manufacturer of high-voltage control products, with its core product being a module power supply model ZD300-24S220N. Lingji Company alleges that its four former employees, Zhou, Li Long, Wei, and … Read more

Transparent Ink Circuit Boards: Is Copying Them Convenient?

Transparent Ink Circuit Boards: Is Copying Them Convenient?

It must be said that the new transparent ink launched by Lieban has caused quite a stir… Since the launch of pink ink in August, it has attracted widespread attention in the circuit board industry. Recently, the newly launched transparent ink has sparked another wave of discussion.The editor has compiled the private messages and comments, … Read more

Exploring Schneider PLC Worm Technology

Exploring Schneider PLC Worm Technology

Author: Green Alliance Technology, Ge Wu Laboratory, Chen Jie Background Recently, researchers abroad discovered a code injection vulnerability in Schneider’s systems (CVE-2020-7475), which could allow Schneider PLCs to be turned into worms. If successfully exploited, this vulnerability could enable the PLC to act as a small PC executing malicious network activities, serving as an internal … Read more

The Correspondence Between Assembly Language and C Language

The Correspondence Between Assembly Language and C Language

The Root of the Dilemma in Understanding Assembly Language For programmers who are “native” in C/C++, reading assembly code often encounters the following difficulties: Poor Readability: Assembly instructions have a low level of abstraction and lack the expressiveness of high-level languages. Lack of Context: Low-level details such as register operations and memory accesses obscure the … Read more

Is Silkscreen Position Number Necessary on PCB? Many Products Actually Do Not Have It!

Is Silkscreen Position Number Necessary on PCB? Many Products Actually Do Not Have It!

Is it possible not to place silkscreen position numbers on a PCB? The silkscreen position number is mainly for convenience during manual soldering or prototype debugging stages, as it visually indicates the component positions, facilitating assembly, maintenance, and testing, primarily used in the prototype phase. It is indeed possible to manage without position numbers when … Read more

In-Depth Analysis of the BattlEye Kernel Driver Detection Module

In-Depth Analysis of the BattlEye Kernel Driver Detection Module

This article is a featured post from the KX Forum, authored by KX Forum ID: Ghost Talent zxy 1 Overview of BattlEye BattlEye is divided into the following four components: BEService – A service that communicates with the BattlEye server. BEDaisy – A kernel driver that performs various kernel-level detections and communicates with BEClient. BEClient … Read more

Reverse Engineering of a Parameterless C Function with Return Value in 32-bit

Reverse Engineering of a Parameterless C Function with Return Value in 32-bit

Reverse Engineering of a Parameterless C Function with Return Value in 32-bit Below is a simple example of a C function that does not take any parameters but returns an integer value. Additionally, I provide step-by-step instructions for writing and viewing its assembly code using Visual Studio 2022. C Function #include <stdio.h> // Definition of … Read more

Twin-engine Mid-thrust + DSI Air Inlet: Is India’s Stealth Fighter Secretly Learning from the J-35?

Twin-engine Mid-thrust + DSI Air Inlet: Is India's Stealth Fighter Secretly Learning from the J-35?

According to a report by Global Network on June 7, 2025, the latest full-size model of India’s AMCA stealth fighter released by the Ministry of Defense shows that its twin-engine mid-thrust + DSI air inlet layout has an 82% similarity to China’s J-35 fighter. This incident, characterized by international military experts as a “systematic technological … Read more

A Simple Note on Python Reverse Engineering

Introduction Over the past decade, a significant amount of malware has been written in interpreted programming languages (such as Python), with increasing numbers and effective evasion techniques. In daily work, there are processes that require analyzing malicious files based on frontline feedback to obtain relevant information. When manually reverse engineering, one inevitably encounters Python malicious … Read more