Emre Can Okten

82%
Flag icon
Underground hackers often analyze the binary code from licensed programs like Windows, Photoshop, and Grand Theft Auto, in order to determine which part of the code verifies the license. They modify the binary code, placing an instruction to directly JUMP to the part of the code that executes after the license has been validated. When the modified binary is run, it gets to the injected JUMP command before the license is even checked, so people can run these illegal, pirated copies without paying.
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
Rate this book
Clear rating
Open Preview