Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacker Debugging Uncovered (Uncovered series)

Buy

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of them deserves reproach!

Hacking is not the same thing as vandalism. Hacking is the demonstration of natural curiosity and desire to understand the surrounding world. Disassembled listings, machine commands, black screens of SoftIce that are reminders of the early days of MS-DOS—all these are interesting and captivating. Among them is the entire world of hidden mechanisms and protection code. Do not look for them on the maps; this world exists only in fragments of printouts, technical manuals automatically opening at the most interesting positions, and, of course, sleepless nights spent at the monitor.

This book is neither a manual on cracking nor a manual on antihacker protection. Such books are already available in abundance. Rather, this book contains the “travel notes” of a code digger. You’ll examine Intel’s compilers, look inside the protection mechanisms of commercial programs, and learn how the debugger works and how to work with it expertly. In general, if you are not so afraid that you immediately close this book and throw it away, you’ll learn many new and interesting facts.

About the Author

Casually-dressed young man (age 28) who doesn’t pay attention to the surrounding world or his own body, dwelling exclusively in the jungle of machine codes and maze of technical specifications. Unsociable. Leads the secluded life of a predator rodent  that practically never leaves his hole (unless it is to look at the stars). Has a luckless private life (and unlikely that it will become lucky in the future), so the only method of killing time from dusk until duskier is to be fully absorbed by work.

I’ve been obsessed by computers since childhood (or even earlier—unfortunately, I can’t recall). Mainly, I specialize in reverse engineering (disassembling), finding vulnerabilities (holes) in existing protection mechanisms, and developing my own protection systems. Nevertheless, computers are not my only and, perhaps, not my main passion. In addition to being concerned with the hardware and wandering in the jungle of the protection code, I am never far from the night sky and my telescopes. I read many books (and even write ones). Recently, I have been writing more than reading. The hacking motives of my creations are not simply luck. They are the result of natural curiosity in “what’s under the hood” of a computer and a desire to crack something using a crowbar or hammer (figuratively, or course). Is it possible to understand otherwise how this thing works?

If hackers are individuals obsessed by understanding the universe, then I am a hacker.

(HTML tags aren't allowed.)

A Programmer's Guide to Java (tm) Certification
A Programmer's Guide to Java (tm) Certification
"We have written A Programmer’s Guide to Java Certification to allow the reader to master the Java programming language. Mastering the language should naturally culminate in the practical goal of passing the Sun Certified Programmer for Java‘ 2 Platform exam. In addition to preparing the reader thoroughly for the exam, this...
Resource Management for Device-to-Device Underlay Communication (SpringerBriefs in Computer Science)
Resource Management for Device-to-Device Underlay Communication (SpringerBriefs in Computer Science)

Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system...

Essential JavaScript for Web Professionals
Essential JavaScript for Web Professionals
Welcome! This book is something we wish we had when we were first starting out
with JavaScript. At that time, there were basically two types of instructional
books on the market: 1200-page tomes of seemingly arcane knowledge, and
books that were overly simplified and lacking in practical information.
Unfortunately, there were no
...

Using LinkedIn
Using LinkedIn

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn currently has more than 65 million...

PHP Cookbook: Solutions & Examples for PHP Programmers
PHP Cookbook: Solutions & Examples for PHP Programmers

Want to understand a certain PHP programming technique? Or learn how to accomplish a particular task? This cookbook is the first place to look. With more than 350 code-rich recipes revised for PHP 5.4 and 5.5, this third edition provides updated solutions for generating dynamic web content—everything from using basic data types...

Advanced Polymeric Systems: Applications in Nanostructured Materials, Composites and Biomedical Fields (River Publishers Series in Polymer Science)
Advanced Polymeric Systems: Applications in Nanostructured Materials, Composites and Biomedical Fields (River Publishers Series in Polymer Science)
Over recent years a considerable amount of effort has been devoted, both in industry and academia, towards the incorporation of various macro, micro, and nano sized fillers into polymers. There is also much interest in the evaluation of various polymer properties with respect to a wide set of applications. The advances in nanotechnology...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy