Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #8 - Basic Software Cracking

 

Rating :

 

Comments

 
  • Safiyah
    Safiyah at November 24,2016
    The quality of this presentation was indeed rough, to say the least, both visually and verbally. It really did seem almost more like he recorded his trial and error session rather than a confident, instructional tutorial. That said, it was nice to finally see the username adjustment I was looking for in part 3.
  • jwren2
    jwren2 at December 12,2016
    This was very interesting. First, being able to find the real username by looking at the program through Ollybdg, and looking at the incorrect username comparing with the correct username, and then entering the correct username, and having to do the same thing with the password.
  • dbegum
    dbegum at December 13,2016
    As with his any video, he showed how to find real password by looking at the messages that output and making sense of that information. The video itself is very poor quality and his voice; I wish it could be litter clearer. But you kind of follow through his movement to see what he were doing on the software.
  • asdfaslkjadsfasdasdfas
    asdfaslkjadsfasdasdfas at December 15,2016
    Video was pretty low picture quality, message was very similar to the last two. I wonder how often this program is used in comparison to competitor programs.
  • aki
    aki at December 15,2016
    This video is kind of similar to the 2 tutorial for Ollydbg, the only difference s is in this video the instructor also finding the username with the password. But one of the thing that break points are really important in analyzing such programs, we can put break points and can run the program in parts to understand the working of the program in better ways.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved