On 6 Apr '08, at 8:18 AM, alex wrote:
Just to add to this discussion- in _most_ cases ANY piece of code
that is loaded into RAM can be _easily_ reversed. I think there are
like two exceptions to that!
O'Reilly's "Secure Programming Cookbook" has a chapter on making code
resistant to cr
Just to add to this discussion- in _most_ cases ANY piece of code
that is loaded into RAM can be _easily_ reversed. I think there are
like two exceptions to that!
I used to do this sort of thing on paper with colored pencils but now
you can use a tool like IDA Pro (which rocks by the way)
On Apr 3, 2008, at 3:17 PM, Nick Zitzmann wrote:
On Apr 3, 2008, at 3:06 PM, justin webster wrote:
just wondering how easy it is for would-be hackers to get inside my
code.
It depends. For 32-bit apps, it's trivial for someone to inject code
using an input manager or something. For 64-bi
On Thu, Apr 3, 2008 at 5:06 PM, justin webster <[EMAIL PROTECTED]>
wrote:
> just wondering how easy it is for would-be hackers to get inside my code.
> how meaningful and human-readable is a reverse engineered version of my
> app?
> is there a particular tool a hacker would use for Mac apps?
>
> a
I'm not a hacker, but if I had to figure out how a Cocoa app worked in a
hurry, I'd check out F-Script Anywhere.
justin webster wrote:
just wondering how easy it is for would-be hackers to get inside my code.
how meaningful and human-readable is a reverse engineered version of
my app?
is the
On Apr 3, 2008, at 3:06 PM, justin webster wrote:
just wondering how easy it is for would-be hackers to get inside my
code.
It depends. For 32-bit apps, it's trivial for someone to inject code
using an input manager or something. For 64-bit apps, I don't think
that's been done yet, but it
just wondering how easy it is for would-be hackers to get inside my
code.
how meaningful and human-readable is a reverse engineered version of
my app?
is there a particular tool a hacker would use for Mac apps?
any help much appreciated,
justin
___