Research (2)

July 2, 2011

Reverse engineering software protections

Learn how to do in depth analysis of compressed and encrypted binary files