this is typically a classic case of "if you even have to ask, then it's not for you." If you have some very rare and odd friends willing to show you the ropes, if you're a terrific self-starter with lots of discipline and time to waste, or if you've already got a degree in computer science then the idea might be worth investigating, but in most cases it's just a pipe-dream that people should shelve.Ġ1. Work your way up to the hard stuff, and hopefully you'll meet some hip and in-the-know people to give you some specific advice.īut. Next step would be to just jump in the shallow end of the pool and actually do it. Then there's the various common forms of crypto: AES and RSA being used frequently. Then explore common methods for calculating checksums/CRCs. hex/ASCII, API calls, x86 Assembly, and bitwise operations/logic (like what happens when you're XORing by 1, ANDing by 0, etc.) for starters. There are plenty of non-protection specific things to learn: How to use a debugger, binary vs.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |