b.t.w. some products even won't install if they find reverse engineering (disassembling, etc..) tools present on the machine. But those days as interpreted languages are becoming more and more common, trying to disassemble software seems to be worthless activity, because the code is not compiled but rather obfuscated or encrypted in some way. Still, once the post appeared on the Rev list, I wonder, if it is possible to reverse engineer a rev application which stores the scripts in encrypted stacks? Reading and exploring RAM contents during execution of an application?

V.
_______________________________________________
use-revolution mailing list
[email protected]
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to