samat December 04,2016 woohoo, it is so simple to cark a software as seen in the video. If you are good at general understanding of assembly language and also a little bit of reverse engineering skill, you can access the back door, and able to change modify or even to inject some kind of malware. Even it is very difficult to do large task (modification), such thing may help to develop the skill set, how things work in the low-level language, which part of code is doing what, It is so interesting
jwren2at December 12,2016 I found this tutorial hard to follow because he was moving a little too fast. I understood the concept though. It would be interesting to try these in one of our labs, but this would be in the hacker side of it, not on the computer forensics (security) side.
asdfaslkjadsfasdasdfasat December 15,2016 I think the 8 part tutorial was overall informative, but also confirmed my belief that I never want to be in a job that involves software engineering level security testing. Very informative though, great series.
akiat December 15,2016 THe video is good. Can be usd to register lots of unregistered programs.
But what if when we need to update the program, will it go online and check the version is really registered or not. And will contacting online can change the code and again make it unregistered?
BSharmaat May 03,2017 Another example of how to register "unregistered" products. Good use of assembly language instructions knowledge to maneuver around code for code modification for changing programs.