- Mastering Reverse Engineering
- Reginald Wong
- 213字
- 2021-06-10 19:40:18
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "The handle in hkResult is used by RegEnumValueA to begin enumerating each registry value under the registry key."
A block of code is set as follows:
while (true) {
for (char i = 1; i <= 255; i++) {
if (GetAsyncKeyState(i) & 1) {
sprintf_s(lpBuffer, "\\x%02x", i);
LogFile(lpBuffer, (char*)"log.txt");
}
}
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
87 to base-2
87 divided by 2 is 43 remainder 1.
43 divided by 2 is 21 remainder 1.
21 divided by 2 is 10 remainder 1.
10 divided by 2 is 5 remainder 0.
5 divided by 2 is 2 remainder 1.
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "In VirtualBox, click on File|Import Appliance."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- 科技安全:戰(zhàn)略實踐與展望
- 網絡空間攻防技術原理
- API安全實戰(zhàn)
- Practical Network Scanning
- Wireshark 2 Quick Start Guide
- 代碼審計:企業(yè)級Web代碼安全架構
- Testing and Securing Android Studio Applications
- 數據安全與隱私計算(第3版)
- End to End GUI Development with Qt5
- 信息安全工程與實踐
- 構建新型網絡形態(tài)下的網絡空間安全體系
- 華為Anti-DDoS技術漫談
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 數字銀行安全體系構建
- 網絡安全技術及應用實踐教程