Hacker Disassembling Uncovered, 2nd ed

Hacker Disassembling Uncovered, 2nd ed

Author: Kris Kaspersky

Publisher: БХВ-Петербург

Published: 2007

Total Pages: 610

ISBN-13: 1931769648

DOWNLOAD EBOOK

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of how to go about disassembling a program with holes without its source code. Detailing hacking methods used to analyze programs using a debugger and disassembler such as virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators, this guide covers methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well, and a CD-ROM that contains illustrations and the source codes for the programs is also included.


Hacker Debugging Uncovered

Hacker Debugging Uncovered

Author: Kris Kaspersky

Publisher: БХВ-Петербург

Published: 2005

Total Pages: 606

ISBN-13: 1931769400

DOWNLOAD EBOOK

Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in this debugger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstrated. Programmers will learn how to look at what is inside a computer system, how to reconstruct the operating algorithm of a program distributed without source code, how to modify the program, and how to debug drivers. The use of debugging applications and drivers in Windows and Unix operating systems on Intel Pentium/DEC Alpha-based processors is also detailed.


Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

Author: Kris Kaspersky

Publisher: БХВ-Петербург

Published: 2003

Total Pages: 584

ISBN-13: 1931769222

DOWNLOAD EBOOK

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler. These methods include virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. Also covered are methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well.


Shellcoder's Programming Uncovered (Uncovered series)

Shellcoder's Programming Uncovered (Uncovered series)

Author: Kris Kaspersky

Publisher: БХВ-Петербург

Published: 2005

Total Pages: 499

ISBN-13: 193176946X

DOWNLOAD EBOOK

How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are


Programming in C

Programming in C

Author: Xingni Zhou

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2020-09-21

Total Pages: 371

ISBN-13: 3110692325

DOWNLOAD EBOOK

This book covers C-Programming focussing on its practical side. Volume 1 deals mainly with basic data structures, algorithms and program statements. An extensive use of figures and examples help to give a clear description of concepts help the reader to gain a systematic understanding of the language.


Hackers & Painters

Hackers & Painters

Author: Paul Graham

Publisher: "O'Reilly Media, Inc."

Published: 2004-05-18

Total Pages: 272

ISBN-13: 0596006624

DOWNLOAD EBOOK

The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.


Data Recovery Tips & Solutions: Windows, Linux, and BSD

Data Recovery Tips & Solutions: Windows, Linux, and BSD

Author: Kris Kaspersky

Publisher: БХВ-Петербург

Published: 2006

Total Pages: 340

ISBN-13: 1931769567

DOWNLOAD EBOOK

This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating principles of the most popular file systems, automatic data recovery techniques, and manual recovery techniques used in cases of total data destruction. Data recovery from hard drives and optical storage in Windows, BSD, and Linux file systems is described, as are automatic recovery utilities, manual and automatic recovery of deleted files on ext2/ext3 partitions and NTFS partitions, formatted NTFS partitions and deleted UFS/FFS files, RAID data recovery, media restoration with physical damage, and data loss prevention.


Game Hacking

Game Hacking

Author: Nick Cano

Publisher: No Starch Press

Published: 2016-07-01

Total Pages: 305

ISBN-13: 1593276699

DOWNLOAD EBOOK

You don’t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of Windows-based development and memory management, and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries. Level up as you learn how to: –Scan and modify memory with Cheat Engine –Explore program structure and execution flow with OllyDbg –Log processes and pinpoint useful data files with Process Monitor –Manipulate control flow through NOPing, hooking, and more –Locate and dissect common game memory structures You’ll even discover the secrets behind common game bots, including: –Extrasensory perception hacks, such as wallhacks and heads-up displays –Responsive hacks, such as autohealers and combo bots –Bots with artificial intelligence, such as cave walkers and automatic looters Game hacking might seem like black magic, but it doesn’t have to be. Once you understand how bots are made, you’ll be better positioned to defend against them in your own games. Journey through the inner workings of PC games with Game Hacking, and leave with a deeper understanding of both game design and computer security.