Hello forum members,
The security aware know that techniques can be used for good purposes or towards bad. But we have to know about them for our own good, even when it is considered now controversial knowledge. Read this book on this topic here:
http://www.acm.uiuc.edu/sigmil/RevEng/ch01.html
Also see: http://www.felinemenace.org/papers/reversing_workshop.pdf
Enjoy,
polonus
Dear polonus,
But we have to know about them for our own good
I just have to know which programs to use so that if a program has been tampered with,
it doesn't cause any damage on my computer. :)
Hi Bob3160,
That is just what it is all about. The only one that should trust the programs on your computer is you. That is why you could use a tool like FileAlyzer from here: http://www.snapfiles.com/get/filealyzer.html
In this case you can see what packers were used, if the hashes were right as the original software was meant to be. The only one that could see whether a program was resource engineerted should be you. Learn to use a good hex viewer too.
polonus