Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #7 - Basic Software Cracking

 

Rating :

 

Comments

 
  • kcn278
    kcn278 at April 19,2015
    I have never cracked applications before, but I am guessing people who tries to crack software for free use will try to manipulate the procedural process of the program with something like this. This also brings up the curiosity of whether developers try to defend their codes elaborately to prevent cracks because usually there are always crack for an application regardless of what version there are for it.
  • Ahmed
    Ahmed at May 03,2015
    this software could be really useful for forensics examiners, it has some great features for malware patching.
  • busterhax
    busterhax at November 27,2015
    While I don't find these videos helpful when it comes to using disassemblers, they show that there are multiple ways to approach different situations.
  • haygaff
    haygaff at December 19,2015
    Cracking software is not my desire. I can see the need and in some cases why you would want to. This guy does just flow right through it and does appear to have extensive experience with OLLBDG.
  • haneen
    haneen at February 29,2016
    If he is able to change the parameters, then he has the control on the program, and even on it's users. Because he could change the variables for user accounts and password. He might be able to disable password features and then the software won't ask for a passowrd. I think this is awesome as a forensic tool, I wish I have the time to learn it. BTW, I seems to be a little bet hard!
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved