Search This Blog

16 June 2005

Introduction to Reverse Engineering Software

we should then discuss general approaches, so that it is within every motivated user's ability to obtain information locked inside the black box

Hehe. Now that's funny.