so_damn_insane ([info]so_damn_insane) rakstīja,
@ 2007-04-13 18:02:00

Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Mūzika:RATM
Entry tags:slashdot

caur /.
Tādi hakeri...
The debugger allowed us to place a breakpoint immediately after the call to VerifyPassWord(), upon which we entered a fictional password and changed the return value 0 in the register to 1.

Atceros, kā ar HIEW.EXE laboju Diablo2 character failus. Convert to hex.. reverse byte sequence.. voila!



(Ierakstīt jaunu komentāru)

Neesi iežurnalējies. Iežurnalēties?