Scott Garman wrote:
Hi all,

I have become interested in learning about reverse engineering and
decompilation techniques, particularly for the purpose of studying
programs that exploit security vulnerabilities (including trojans,
viruses, and worms).

There was a slashdot story about it not too long ago: <http://developers.slashdot.org/article.pl?sid=03/07/06/2014230>

Here's the meat:
<http://www.acm.uiuc.edu/sigmil/RevEng/>



Erik

_______________________________________________
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss

Reply via email to