Scott Garman wrote:
Hi all,
I have become interested in learning about reverse engineering and decompilation techniques, particularly for the purpose of studying programs that exploit security vulnerabilities (including trojans, viruses, and worms).
There was a slashdot story about it not too long ago: <http://developers.slashdot.org/article.pl?sid=03/07/06/2014230>
Here's the meat: <http://www.acm.uiuc.edu/sigmil/RevEng/>
Erik
_______________________________________________ gnhlug-discuss mailing list [EMAIL PROTECTED] http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss