说明: Providing step-by-step instructions and examples required to produce full-featured, robust rootkits, this book walks you through all of the capabilities of rootkits, the technology they use, and the detection methods to impede their distribution. <xiqobai> 上传 | 大小:7mb
说明: This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more. <xiqobai> 上传 | 大小:4mb