Forums - Open Redstone Engineers

Full Version: The SCAM IS 0 - Register-based, Highly Functional IS
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
[Image: tpMa2c0.png]

Hey everybody, this is Ice, and today I've made my second 16-bit IS for the planned project that is the Ice-200 computer.

Because of its relative uniqueness, I thought I would post this here as the:

Simplified
CPU-Automated
Minimalistic
Instruction Set, revision 0.

This instruction set is made for ease of use and simplicity, while retaining much of the gaming-oriented speed and power Ice-200 will hopefully have. Features include a stack or queue, four general input switches, a 16x16 screen, four general indicator lights, and more. A serial output port is also included, possibly with variable serial transmission speed. (2 tick might be the standard, but who knows?)

Now, onto the IS itself. The system is set up like so:
(4 bit opcode) (4 bit ARG1) (4 bit ARG2) (2 bit ARG3) (1 bit condition) (1 bit pause function)

The commands and functions can be found @ /warp scamis0. A PDF may be attatched if you prefer to look at that.

Final notes: I will most likely use a stack as opposed to a queue due to wiring issues. Also, this IS is free for you to use and modify (with credit if you want to be nice) in any of your machines. If you see any possible issues, mention them down below!
Such an awesome name for it xD
Will it be possible for you to hack my computer if I use this IS? Tongue
(10-25-2013, 06:59 PM)DJ8X Wrote: [ -> ]Will it be possible for you to hack my computer if I use this IS? Tongue

Yes. Your real computer.

Be scared.
*runs with laptop*
*dw guys mac's don't get viruses*
tehe
Actually macs CAN get viruses, but it is harderto make one for macs.
^ Indeed yes. One thing to note though, is that Hackers focus on the majority of users on one platform. You can scream as long as you want "Use Linux! Buy a Mac cause no viruses!", the colt hard truth is that if the majority of end-users were using linux, there would be waay more risk into using Debian or Centos than using Windows 7 / 8. You can see this beautifully developing in the smartphone world. More and more so called "Viruses" are being used on android devices nowadays, and you know why? Because half of the damm population on earth uses a smartphone, meaning that this is a very interesting group of potential victims for hackers.
(10-28-2013, 02:47 PM)EvilDevil59NL Wrote: [ -> ]^ Indeed yes. One thing to note though, is that Hackers focus on the majority of users on one platform. You can scream as long as you want "Use Linux! Buy a Mac cause no viruses!", the colt hard truth is that if the majority of end-users were using linux, there would be waay more risk into using Debian or Centos than using Windows 7 / 8. You can see this beautifully developing in the smartphone world. More and more so called "Viruses" are being used on android devices nowadays, and you know why? Because half of the damm population on earth uses a smartphone, meaning that this is a very interesting group of potential victims for hackers.

That's the half truth. The Unix/linux/etc (*nix) architecture is extremely secure, by design (compared to Windows). And after all, potentially dangerous vulnerabilities get patched by the open source community (~1500 active linux developers) in lightning speed.

(Relevant - http://www.cvedetails.com/vulnerability-...ernel.html)
Also windows has a backdoor in it for the NSA.
Pages: 1 2