I'm very pleased with my PAL VIC-20 replica, the Vicky-20 [https://www.tindie.com/products/bobsbits/vicky-twenty-commodore-vic-20-pcb-replica/] . It's almost a year old and the VIC-20 that sits on my desk all the time. I've wanted the absolute best video out of this thing I could muster. This board is fortunately
Last year, we did the 100 door problem on many platforms in BASIC and Assembly language [https://imapenguin.com/just-for-fun-the-100-door-problem-on-several-different-systems/] . The 100 door problem is: * There are 100 closed doors in a row. * You walk past the doors 100 times (100 passes) * The first time, visit every door. If the
I'm a Commodore guy through and through. This isn't tribalism, it's what was in my room from 1983 to when I graduated High School in 1993. After my sorta failed attempt at spending the month of September with my Coco 2 [https://imapenguin.com/two-weeks-with-mostly-a-coco-2-in-september/], I decided for October to
Back in March, we did a simple set of programs to brute force calculate Pi using a simple and well-known series [https://imapenguin.com/estimating-pi-with-the/]. It works, even if it's inefficient. Speaking of inefficient, it's September and that means it's time for #Septandy! I have a Tandy Color Computer 2
A few months ago, I stumbled on a project that really caught my attention. Mr. Bernardo Kastrup, aka TheByteAttic [https://www.thebyteattic.com/#!] finished a video series on a computer he designed and built "by hand [https://www.youtube.com/watch?v=1ASspLiE39g&list=PLDf2uklC__d2DAXmF9XuOq_-uNc2M9ITd] ." It's an impressive
A while ago, I explained in detail how to generate one time pad sheets [https://imapenguin.com/simple-unbreakable-encryption-with-a-pencil/] and use them to encrypt and decrypt messages. It turned out to be doable, only requiring a pencil and a way to create random numbers, but it's slow, error prone and tedious.
Hashes We did an implementation of a once popular hashing function in Part 8 on RC4 [https://imapenguin.com/making-and-breaking-ciphers-on-the-commodore-64-part-8-rc4/] without really going into why. A hash function is any function that is used to map data of an arbitrary size (input) to a fixed size output. An algorithm is