sequential (41) The function of a modulator (4)

 https://wodewangzhishime.blogspot.com/2022/03/httpswodewangzhishime_14.html.

.

Ref:  https://wodewangzhishime.blogspot.com/2022/01/httpswodewangzhishime_20.h

.

.
John: Before we start, you may read this article (https://wodewangzhishime.blogspot.com/2022/01/httpswodewangzhishime_20.html). 
Me: OK.
John: Now, we look at the 1st picture.
Me: OK.
John: Do you see a RJ 45 circuit?
Me: Yes,. I do see it.
John: I inteprete it in code.
.
If (port A from RJ 45 = 32 bits)
{

MOV receiver_register, value of Port A.

}
.
John: In this case, the register of receiver, Port A, counter, if and else must choose the clock line of RJ 45 rather than the clock line of the system. You may take a look at this article ( https://wodewangzhishime.blogspot.com/2023/12/sequential-99.html ).
.
Me: OK.
.
John: At the same time, all the cache of receiver, port A, if and else must choose the clock line of RJ 45 instead of the clock line of the system. Finally it become,
.
Subject [receiver_register]
interrupt [RJ 45]
object []
.
Subject [Port A]
interrupt [RJ 45]
object []
.
Subject [counter_register]
interrupt [RJ 45]
object []
.
Subject [If_register]
interrupt [RJ 45]
object []
.
Subject [else_register]
interrupt [RJ45]
object []
.
==
.
Subject [receiver_cache]
interrupt [RJ 45]
object []
.
Subject [Port A cache]
interrupt [RJ 45]
object []
.
Subject [counter_cache]
interrupt [RJ 45]
object []
.
Subject [If_cache]
interrupt [RJ 45]
object []
.
Subject [else_cache]
interrupt [RJ45]
object []
.
John: It is the principles of hacking. You may have a look (https://wodewangzhishime.blogspot.com/2022/07/cai-yourong-spy.html). .

Comments