CPUID

Results: 135



#Item
51VIRUS BULLETIN www.virusbtn.com  TECHNICAL FEATURE ANTI-UNPACKER TRICKS – PART THREE Peter Ferrie

VIRUS BULLETIN www.virusbtn.com TECHNICAL FEATURE ANTI-UNPACKER TRICKS – PART THREE Peter Ferrie

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:43:27
52MOV / Calling convention / Computing / Assembly languages / Computer programming / CPUID / X86 assembly language / Decompiler / X86 architecture / Software engineering

Stage Once – a Visual Novel hacking tutorial This is an MS Word (.doc) version of my tutorial located at my _blog_. It might be slightly outdated than the _original_article_. Necessary files and documentation can be

Add to Reading List

Source URL: proger.i-forge.net

Language: English - Date: 2011-06-21 11:27:22
53Microsoft Word - And a pinch of Delphi.doc

Microsoft Word - And a pinch of Delphi.doc

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:50
54Source Code Optimization Felix von Leitner Code Blau GmbH [removed] October 2009 Abstract

Source Code Optimization Felix von Leitner Code Blau GmbH [removed] October 2009 Abstract

Add to Reading List

Source URL: www.fefe.de

Language: English - Date: 2009-10-28 19:17:22
55Using Block Prefetch for Optimized Memory Performance Advanced Micro Devices Mike Wall Member of Technical Staff Developer Performance Team

Using Block Prefetch for Optimized Memory Performance Advanced Micro Devices Mike Wall Member of Technical Staff Developer Performance Team

Add to Reading List

Source URL: files.rsdn.ru

Language: English - Date: 2009-06-04 15:30:55
56Malicious Code Injection via /dev/mem Anthony Lineberry <anthony.lineberry@gmail.com> March 27, 2009 Abstract In this paper we will discuss methods for using the character device, /dev/mem, as an entry point for injectin

Malicious Code Injection via /dev/mem Anthony Lineberry March 27, 2009 Abstract In this paper we will discuss methods for using the character device, /dev/mem, as an entry point for injectin

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
57Writing better code with help from the compiler Thiago Macieira LinuxCon North America – August/2014

Writing better code with help from the compiler Thiago Macieira LinuxCon North America – August/2014

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-10-09 03:35:36
58Intel® Core™2 Extreme Quad-Core Mobile Processor, Intel® Core™2 Quad Mobile Processor, Intel® Core™2 Extreme Mobile Processor, Intel® Core™2 Duo Mobile Processor, Intel® Core™2 Solo Mobile Processor and

Intel® Core™2 Extreme Quad-Core Mobile Processor, Intel® Core™2 Quad Mobile Processor, Intel® Core™2 Extreme Mobile Processor, Intel® Core™2 Duo Mobile Processor, Intel® Core™2 Solo Mobile Processor and

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2011-12-14 13:16:37
59OptiROP: the art of hunting ROP gadgets - Proposal for Blackhat USA 2013 Nguyen Anh Quynh <aquynh@gmail.com> Abstract Return-Oriented-Programming (ROP) is the fundamental technique to bypass the widely-used DEP-based exp

OptiROP: the art of hunting ROP gadgets - Proposal for Blackhat USA 2013 Nguyen Anh Quynh Abstract Return-Oriented-Programming (ROP) is the fundamental technique to bypass the widely-used DEP-based exp

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 04:35:32
60Previous  chapter 19 pentium: not the same old song

Previous chapter 19 pentium: not the same old song

Add to Reading List

Source URL: downloads.gamedev.net

Language: English - Date: 2011-08-09 01:03:16