- Mastering Reverse Engineering
- Reginald Wong
- 213字
- 2021-06-10 19:40:18
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "The handle in hkResult is used by RegEnumValueA to begin enumerating each registry value under the registry key."
A block of code is set as follows:
while (true) {
for (char i = 1; i <= 255; i++) {
if (GetAsyncKeyState(i) & 1) {
sprintf_s(lpBuffer, "\\x%02x", i);
LogFile(lpBuffer, (char*)"log.txt");
}
}
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
87 to base-2
87 divided by 2 is 43 remainder 1.
43 divided by 2 is 21 remainder 1.
21 divided by 2 is 10 remainder 1.
10 divided by 2 is 5 remainder 0.
5 divided by 2 is 2 remainder 1.
Bold: Indicates a new term, an important word, or words that you see onscreen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "In VirtualBox, click on File|Import Appliance."
Warnings or important notes appear like this.
Tips and tricks appear like this.
推薦閱讀
- unidbg逆向工程:原理與實踐
- 網絡安全應急管理與技術實踐
- 電子支付的規制結構配置研究
- Web安全與攻防入門很輕松(實戰超值版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網絡安全與攻防入門很輕松(實戰超值版)
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Cybersecurity Threats,Malware Trends,and Strategies
- 網絡安全實戰詳解(企業專供版)
- 網絡入侵檢測系統原理與應用
- 安全網絡構建
- Instant OSSEC Host-based Intrusion Detection System
- 網絡安全攻防技術實戰
- 復雜網絡環境下訪問控制技術