Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #8 - Basic Software Cracking

 

Rating :

 

Comments

 
  • stadkal
    stadkal at April 22,2016
    It explains about the search feature to find the passwords but when we come to 4th tutorial we expect something more complex to learn not just the same thing that is explained in previous ones.
  • adam
    adam at April 25,2016
    I think that the information from the first three videos is enough to figure this out. There isn't too much new information here. We can see how software developers start to change up the way they validate software by placing certain strings only in RAM. This may help to thwart a reverse engineer from cracking their intellectual property
  • jnegron
    jnegron at April 29,2016
    Like the video. Didn't know about OLLYDBG but analyzing softwares using binary code analysis makes it useful in cases .
  • jnegron
    jnegron at April 29,2016
    Like the video. Didn't know about OLLYDBG but analyzing softwares using binary code analysis makes it useful in cases .
  • nick
    nick at May 02,2016
    This was a tougher video to watch. The entire video was out of focus, so that fact took away from the overall value of the video. Th presenter is doing an adequate job of building off of previous videos, but this tutorial was clumsily put together. With that being said, the stack area was introduced, so again with a small time commitment the viewer is exposed to analysis that becomes slightly more complex and introduces the concept of the stack. The presenter should have taken some additional time to adjust the focus and deliver the audio in a more crisp manner.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved