Holder blames loss on sloppy fielding

first_imgGALLE, Sri Lanka (CMC):West Indies captain, Jason Holder, has blamed sloppy fielding by his side for their innings defeat to Sri Lanka in their first cricket Test, which ended at the Galle International Stadium here yesterday.Holder’s men crashed to an innings and six-run defeat to Sri Lanka in the second session of the fourth day of the Test match.The West Indies effort was marred by several sloppy misfields, two missed run-out attempts and five shelled catches, including a sixth that was not attempted.”We created chances with the ball, but we just didn’t take them when we came,” lamented Holder.”If we had, their first innings total would have looked a lot different. If we had new batsmen in at crucial stages when our fast bowlers were fresh, we would have had a chance to have a good burst at them.”Jermaine Blackwood, in a gallant attempt to avert an innings defeat, fell eight runs shy of a century as West Indies were bowled out for 227 in their second innings.Apart from Blackwood the only other West Indian batsman to score a half-century in the match was Darren Bravo with an even 50 in the first innings.Several frontline batsmen again failed to capitalise on starts as the left arm spinner, Rangana Herath, took four second-innings wickets to finish the match with his fifth 10-wicket haul in Tests.”It’s important that we put up a first innings total that’s respectable,” said Holder, who played his first match as Test captain, in just his ninth Test overall.”We only scored 250-odd in the first innings and it set us back. We were pretty much behind the game from there. It was a track you could score runs on once you applied yourselves. Not much in it for the bowlers. Even Rangana Herath – I thought with the harder ball, he was more effective.”Devendra Bishoo grabbed four for 143 as Sri Lanka piled up a huge first-innings score of 484 all out. The 23-year-old skipper applauded the efforts of his bowlers.”I must commend our bowlers. They did really well in the first innings. To come back at the opposition and actually bowl them out was very, very commendable,” Holder said.”I thought our spinners bowled reasonably well and our part-timers in Marlon Samuels and Kraigg Brathwaite did a wonderful job for us. I thought the combination was good enough for this game. It was unfortunate that we didn’t hold our chances. I guess we paid for it.”The second Test will be played in Colombo starting next week Thursday.last_img read more

The aforementioned processor modeling is accomplis

first_imgThe aforementioned processor modeling is accomplished with a proprietary language called Sleigh, which the NSA explained breaks down machine processes into intermediary “P-code.” The code can then be analyzed on the platform’s Windows, MacOS and Linux environments.The exposed API will allow users to write their own plugins for Ghidra, filling in any gaps there might be in the tool’s set of processor instruction sets or executable formats.Ghidra also allows for disassembling, assembling, decompiling, graphing, scripting and “hundreds” of other functions.“Why share such a valuable tool with the public instead of keeping it for classified work?” Pittore and Davitt wrote. “We’re doing this because we firmly believe Ghidra is a great addition to a net defender’s toolbox. It will make the software reverse engineering process more efficient. It will help to level the playing field for cybersecurity professionals, especially those that are just starting out.  We expect the tool will enhance cybersecurity education from capture-the-flag competitions, to school curriculums and cybersecurity training. Releasing Ghidra also benefits NSA because we will be able to hire folks who know the tool. When they’re coming through our doors, they’ll be able to be impactful faster.”More information is available here. The NSA announced at the 2019 RSA Conference in San Francisco this week that it is making its software reverse engineering tool Ghidra available to the public and open source. According to the agency, the project is aimed at making reverse engineering software more attainable with tools designed, among other things, to model processor activity to see how machine code runs on a chip.The framework has been a part of NSA’s cyber security mission and used to analyze malicious code and malware.“Ghidra is the product of years of research and development aimed at solving some of our agency’s most challenging mission problems,” NSA Public Affairs Officers Natalie Pittore and Liam Davitt wrote in a blog post about the project. “It was built to solve scaling and teaming problems and to provide a customizable and extensible software reverse engineering platform.”last_img read more