Top » Catalog » IMT-CDL-New »


IMT-96: Software Hacking-2014

IMT-96: Software Hacking-2014

IMT-96: Software Hacking

Q1: You are a developer at a reputed Internet Security company, your company is about to launch a product in Internet Safety for home users. Design a custom protection scheme that you prefer to be the best way to track piracy at the same time you have to keep your software customer friendly.

Q2: What are EFLAGS? Give examples. Which EFLAG is of the most use and has priority in assembly analysis of programs in a debugger?

Q3: How is a DWORD data type different from the BYTE data type in assembly programming?

Q4: In context to Virtual Memory Management, out of the 3 states of a process's virtual address, in which state is the page access, protected by memory protection option? And which API call is used to specify memory access permissions?

Q5: Explain the working of SoftlCE. Decompilers are not reliable. Why?

Q6: While crackers are breaking time-based protections, what APIs they mostly look for in the program disassembly? And what are the preferred

Countermeasures for it?

Q7: Among UPX, ASPACK and MoleBox (all in their latest versions), which one would you choose to pack your programs and its dependants (DLLs, OCXs etc.) and why?

Q8. A binary program has 50 45 00 00 in the signature field. Determine whether it's a PE,NE, LE or LX file. Mention reason.

Q9: What are descriptors, in context to Symbian mobile OS? How are they useful in mobile application reversing?

Quick Find
Use keywords to find the product you are looking for.
Advanced Search
0 items
Share Product

osCommerce Online Merchant Copyright © 2010 osCommerce
osCommerce provides no warranty and is redistributable under the GNU General Public License
Note: We provide all Solutions and Contents for Reference/Study purpose only.