-
stadkal
at April 22,2016
It explains about the search feature to find the passwords but when we come to 4th tutorial we expect something more complex to learn not just the same thing that is explained in previous ones.
-
adam
at April 25,2016
I think that the information from the first three videos is enough to figure this out. There isn't too much new information here. We can see how software developers start to change up the way they validate software by placing certain strings only in RAM. This may help to thwart a reverse engineer from cracking their intellectual property
-
jnegron
at April 29,2016
Like the video. Didn't know about OLLYDBG but analyzing softwares using binary code analysis makes it useful in cases .
-
jnegron
at April 29,2016
Like the video. Didn't know about OLLYDBG but analyzing softwares using binary code analysis makes it useful in cases .
-
nick
at May 02,2016
This was a tougher video to watch. The entire video was out of focus, so that fact took away from the overall value of the video. Th presenter is doing an adequate job of building off of previous videos, but this tutorial was clumsily put together. With that being said, the stack area was introduced, so again with a small time commitment the viewer is exposed to analysis that becomes slightly more complex and introduces the concept of the stack. The presenter should have taken some additional time to adjust the focus and deliver the audio in a more crisp manner.