programmers resources
  http://www.intel-assembler.it/  (c)2018 intel-assembler.it   info@intel-assembler.it
 
Search :  
Lingua Italiana    English Language   
Articoli e Guide
 
Back to previous category
just an arrow Net Guides
just an arrow Assembler Guides
just an arrow Debug Guides
just an arrow HTML/Script Guides
just an arrow Assembler Sources
just an arrow Virus & Antivirus
just an arrow Various Code


23/01/2009 Featured Article: How to remove Buzus Virus (permalink)




:::3833996:::
Bottone Scambio Directory Pubblicitaonline.it
Home Page | Articles & Guides | Download | Intel Platform | Contacts

Google
 

Articles, Guides and Documents
You are in the articles, guides and manuals section.

On the left you can see a list of articles.To show all the articles of a category you can use the following links and navigate thought all data.

Page  11  of  20           Articles found  191
just an assembly arrow 04/04/2009 Applied Binary Code Obfuscation - Obfuscation in assembler
  Obfuscation is a technique very used for protecting code from prying eyes. It can be a simple XORing of the bytes or a more difficult scrambled and modified rappresentation of the original binary.
AUTHOR: N.George, G.Charalambous
LANGUAGE: ENGLISH
CODE: 00000153
VISITED: 9567


just an assembly arrow 04/04/2009 How to optimize code on a 386/486/Pentium - Intel Assembler Code Optimization and Pipelining
  How to optimize code on a 386/486/Pentium
Michael Kunstelj
AUTHOR: Michael Kunstelj
LANGUAGE: ENGLISH
CODE: 00000154
VISITED: 7041


just an assembly arrow 03/04/2009 Reverse engineering: Anti-cracking Techniques - How to protect your code in 24 pages
  Reverse engineering: Anti-cracking Techniques
12/04/2008
N.George, G.Charalambous

AUTHOR: N.George, G.Charalambous
LANGUAGE: ENGLISH
CODE: 00000152
VISITED: 12514


just an assembly arrow 30/03/2009 Windows Anti-Debug Reference - Several anti-debugging techniques used on Windows
  Windows Anti-Debug Reference
Author Nicolas Falliere
AUTHOR: Nicolas Falliere
LANGUAGE: ENGLISH
CODE: 00000150
VISITED: 7635


just an assembly arrow 30/03/2009 Writing Self-Modifying Code - Utilizing Advanced Assembly techniques
  Creating Alpha-Numeric shellcode

AUTHOR: Russell Sanford
LANGUAGE: ENGLISH
CODE: 00000151
VISITED: 5497


just an assembly arrow 18/03/2009 Hamarsoft's 86BUGS list - Undocumented/buggy instructions of x86 processors
  The 86BUGS list, distributed with Ralf Brown's Interrupt list, is maintained and provided to you by Hamarsoft, the maker of the HAP & PAH datacompression program. Latest version of HAP & PAH is 3.14e.


AUTHOR: Harald Feldmann
LANGUAGE: ENGLISH
CODE: 00000148
VISITED: 6382


just an assembly arrow 18/03/2009 The PC GAMES PROGRAMMERS ENCYCLOPEDIA 1.0 - A collection of 85 asm programming documents
  Brian 'Neuromancer' Marshall collected a load of documents for assembler programming.

AUTHOR: various
LANGUAGE: ENGLISH
CODE: 00000149
VISITED: 13089


just an assembly arrow 07/03/2009 Timing on the PC family (rel.3) - Over 290 pages on programming 8253/8254
  Timing on the PC

This archive contains a technical document useful to PC programmers, with many sample programs. The document covers timing and related subjects on the IBM PC family under DOS. Subjects include BIOS and DOS functions, the BIOS tick count, hardware interrupts, timer tick interrupts, Port B, the 8253/8254 timer, speeding up the timer tick, dynamic tick periods, simulated vertical retrace interrupt, double and triple buffering, absolute timestamping, the RTC, other timing methods, reading the joystick, PWM sound generation.
Freeware. 13400 lines.

AUTHOR: Kris Heidenstrom
LANGUAGE: ENGLISH
CODE: 00000144
VISITED: 7680


just an assembly arrow 01/03/2009 MD5 To Be Considered Harmful Someday - A somehow profetical document by guru Kaminsky
  Joux and Wang’s multicollision attack has yielded collisions for several one-way hash algorithms. Of these, MD5 is the most problematic due to its heavy deployment, but there exists a perception that the flaws identified have no applied implications.

We show that the appendability of Merkle-Damgard allows us to add any payload to the proof-of-concept hashes released by Wang et al. We then demonstrate a tool, Stripwire, that uses this capability to create two files – one which executes an arbitrary sequence of commands, the other which hides those commands with the strength of AES – both with the same MD5 hash.

We show how this affects file-oriented system auditors such as Tripwire, but point out that the failure is nowhere near as catastrophic as it appears at first glance. We examine how this failure affects HMAC and Digital Signatures within Digital Rights Management (DRM) systems, and how the full attack expands into an unusual pseudosteganographic strikeback methodology against peer
AUTHOR: Dan Kaminsky
LANGUAGE: ENGLISH
CODE: 00000141
VISITED: 2490


just an assembly arrow 01/03/2009 CLASSICAL CRYPTOGRAPHY COURSE - Course in 24 lesson
  Cryptography is the science of writing messages that no one except the intended receiver can read. Cryptanalysis is the science of reading them anyway. "Crypto" comes from the Greek 'krypte' meaning hidden or vault and "Graphy" comes from the Greek 'grafik' meaning writing. The words, characters or letters of the original intelligible message constitute the Plain Text (PT). The words, characters or letters of the secret form of the message are called Cipher Text (CT) and together constitute a Cryptogram.
AUTHOR: LANAKI
LANGUAGE: ENGLISH
CODE: 00000142
VISITED: 3386




Previous   1    2    3    4    5    6    7    8    9    10   11    12    13    14    15    16    17    18    19    20   Next




webmaster jes
writers rguru, tech-g, aiguru, drAx

site optimized for IE/Firefox/Chrome with 1024x768 resolution

Valid HTML 4.01 Transitional


ALL TRADEMARKS ® ARE PROPERTY OF LEGITTIMATE OWNERS.
© ALL RIGHTS RESERVED.

hosting&web - www.accademia3.it

grossocactus
find rguru on
http://www.twitter.com/sicurezza3/
... send an email ...
Your name

Destination email

Message

captcha! Code