Description: this be supporting the CD. The book combines examples highlight of the software encryption technology, and its implementation program to help programmers to better protect their software. The book introduced the relevant knowledge of the underlying system, for example, PE format for in-depth analysis and debugging API application, but SEH undisclosed technology in-depth research, thus allowing readers to understand the underlying knowledge, can be applied to their own software to protect various programs, such as anti-tracking technology realization. The book is also the first time publicly how to prepare shell software, and how to shell and procedures for the integration of some other hot technology. The book by the encryption and decryption technology community together to create a first
File list (Check if you may need any files):