Figure 1.2 reports another real more sophisticated example where a network of Guards (g) and Guarded Code (c) is presented beside it's distribution into the real application's memory.
图1.2是另一更复杂的实例,它显示了由防护码(G)和受保护代码(C)组成的网络,也包括它们在真实程序内存中的分配方式。
Guards the network security, becomes the genuine hacker!
捍卫网络安全,成为真正的黑客!
Figure 1.1 shows an example of a possible network of guards.
图1.1就是一个合理的防护码网络例子。
Figure 1.1 shows an example of a possible network of guards.
图1.1就是一个合理的防护码网络例子。
应用推荐