- Aug 24, 2020
- Reaction score
- NL COIN
Lastly, it is for anyone who is engaged constantly or incidentally in writing protections, and who wants to know how to counteract ubiquitous hackers competently and reliably. This book is devoted to hacking basics — to the skills needed for working with a debugger and a disassembler.
The methods of identifying and reconstructing the key structures of the source language — functions (including virtual ones), local and global variables, branches, cycles, objects and their hierarchies, mathematical operators, etc. — are described in detail.