Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #5 - Basic Software Cracking

 

Rating :

 

Comments

 
  • kcn278
    kcn278 at April 06,2015
    I feel that the previous tutorials including this one is using same concepts but just in different scenarios. I guess its a nice tutorial, but it is sort of getting repetitive or at least the tutorials should be combined, but that is up to the uploader of the content.
  • JSahm151
    JSahm151 at April 14,2015
    I agree with kcn278 these Ollydbg tutorials kind of show the same concepts with minor differences each time. It would be nice to see a more in-depth demonstration about the features of this program.
  • Ahmed
    Ahmed at April 16,2015
    i guess all his videos go over the same thing, cracking software, disabling program error message and extending the trial software version period, well it's good to know that these kind of software exists, but it's also good to figure out how to build software that's unbreakable to the OLLYDBG.
  • connellyt
    connellyt at May 02,2015
    I agree with kcn278 that it's the same concept each time, but with different executables. I think this one in particular should be combined with the other video referenced that shows how to activate the buttons that are greyed out. Without that, his change doesn't work.
  • busterhax
    busterhax at September 25,2015
    I imagine more sophisticated applications will use checksums on specific blocks of code to prevent changes like this. I'd like to see tutorials that look into what blocks have checksums and recalculating those checksums.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved