Sogou My resume

Basic personal information Name: Jiang Ye Sex...
Read(616) comments(1)

Sogou [read] Jiang Ye technology space directory

Reverse Engineering Series Reverse engineering 001: Unlocking the FIFA07 legend mode...
Read(1529) comments(2)

Buffer overflow analysis class 09: MS06-040 vulnerability research - - - - - - - - - - - to - depth mining

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(65) comments(0)

Buffer overflow analysis class 08: MS06-040 vulnerability research dynamic debugging

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(51) comments(0)

Buffer overflow analysis class 07: MS06-040 vulnerability research static analysis

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(53) comments(0)

Buffer overflow analysis class 06: W32Dasm buffer overflow analysis

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(175) comments(0)

Buffer overflow analysis lesson 05: write generic ShellCode

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(145) comments(0)

Buffer overflow analysis class 04: preparation of ShellCode

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(194) comments(0)

Buffer overflow analysis lesson 03: the use of buffer overflow

The buffer overflow analysis "this a series of content is I I" spring and Autumn "(www.ichunqiu.com) recorded the eponymous video course notes summary. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Interested friends can combine this paper with the supporting video...
Read(139) comments(0)

Buffer overflow analysis lesson 02: the principle of buffer overflow

Create a program that contains a buffer overflow hidden danger Here we in order to meet the requirements, the first to write a simple existence of Buffer Overflow Hidden program. This program I use VC++6.0 to write, and in the implementation of XP Windows. (here, please pay attention to is that if you use the new version of the VC, since Microsoft added GS mechanism to prevent the emergence of a buffer overflow, then the experiment cannot achieve. First create a Win32 console application, and enter the following code in C language:...
Read(512) comments(0)

Buffer overflow analysis section 01: an introduction to buffer overflow analysis

Preface The buffer overflow analysis of the contents of this series is the summary of I I and recorded the eponymous video course notes. Every time I have finished the course of the document, and then according to the contents of the document to explain the course. This series is the content of starting from zero, to explain to everyone from the shallower to the deeper of buffer overflow. The course is a combination of theory and practice, after each finished some basic theories will with to actual software vulnerability analysis, to help you better understand the vulnerabilities of principle. Introduction to the course Leakage...
Read(537) comments(0)

Article 004: Capriccio on blog traffic breakthrough thirty thousand.

My last blog is written in January 16th this year, the content is about my blog traffic breakthrough twenty thousand. At that time my blog traffic jumped from ten thousand to twenty thousand, the time spent less than two months, was given by the 12 article. But this time, I visited the blog is in the day before yesterday exceeded 30000, is less than two months, but is not the same, in the past two months time, did not write my blog, and even delete an article. Failed to write articles, mainly because these two months have been recorded in video teaching. To this day, I have recorded 39 videos...
Read(596) comments(7)

Article 003: Capriccio on blog traffic breakthrough twenty thousand.

I have in the gossip of the Caprice of the 002 article: blog traffic broken million the idea of "the last said." I plan to in my blog traffic growth per ten thousand, to express my thoughts, sum up the past and look to the future. " That day is on 22 November 2014, today is less than two months, but my blog traffic unexpectedly and an increase of 10000, which went to the to express the feelings of the time. Surprised his blog traffic even in less than two months increased by ten thousand. After all, my first "ten thousand", but spent a full three months of time, with four...
Read(414) comments(0)

The actual trojan virus killing 012: QQ trojan of reverse analysis

First, the foreword In this series of articles, the final part analysis of each virus. If there is no special circumstances, I will use reverse analysis means for the reader thorough analysis of the target virus. But before the "panda burning incense" virus, I used the three article length (each 25 words or so) also analyzed only one-third of the virus, and has not been analyzed to the core part of the virus. Is mainly because that is I this series we analysis the first virus, in order to some principle of things to say clearly, so the somewhat lengthy, mainly take care of the beginner 's friends, get rid of the...
Read(730) comments(0)

Technical interview summary of the issue of the first 007: Tencent housekeeper Anti-Virus Engineer - telephone two

I am in the afternoon of January 8th, three, received a computer manager Tencent computer phone two. This is the Tencent surprise attack, I did not prepare. But I surf the Internet to see should in 7:00 also received Tencent telephone interview. This also shows that after we if to Tencent delivered a resume, then we must be constantly ready. Interview questions this time than last more in-depth and comprehensive, the telephone interview lasted 22 minutes. If you take Tencent interview questions and Jinshan, the most significant difference is that, the interview of Tencent is completely surround my resume.
Read(1404) comments(18)

The actual trojan virus killing 013: a.NET based on the "hold up" virus research

First, the foreword Malicious program development so far, its function has from the initial pure destruction and continuous development to spy on the privacy, steal information, and even now very popular "ripped off" virus, for extorting. Visible with the development of the times, virus writers is often want to use their technology to get dishonest gain, become more and more the utility of the. And this series of articles also complies with the development of this, from a virus to a Trojan horse, then went to the "rip off" virus discussions came up.   Two, what is the "hold up" virus Actually "ripped off" virus...
Read(937) comments(4)
56 data a total of 4 pagesOne Two Three Four The Library Shadowe
    personal data
    • Visit59339 times
    • Integral:One thousand two hundred and thirty-four
    • Grade
    • Rank:Thousands of miles away
    • Original53
    • Reproduced:0
    • Translation:3
    • Comments:62
    Blog column