HOME
*





Fravia
Francesco Vianello (30 August 1952 – 3 May 2009), better known by his nickname Fravia (sometimes +Fravia or Fravia+), was a software reverse engineer, who maintained a web archive of reverse engineering techniques and papers. He also worked on steganography. He taught on subjects such as data mining, anonymity and stalking. Vianello spoke six languages (including Latin) and had a degree in the history of the early Middle Ages. He was an expert in linguistics-related informatics. For five years he made available a large quantity of material related to reverse engineering through his website, which also hosted the advice of reverse engineering experts, known as reversers, who provided tutorials and essays on how to hack software code as well as advice related to the assembly and disassembly of applications, and software protection reversing. Vianello's web presence dates from 1995 when he first got involved in research related to reverse code engineering (RCE). In 2000 he ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Old Red Cracker
Old Red Cracker (abbreviated +ORC) is an anonymous reverser. He was one of the pioneers of publishing cracking lessons on the Internet. While his identity is unknown, reverse engineer Fravia had email correspondence with him and spread his tutorials. Old Red Cracker founded the so-called "High Cracking University" (+HCU), to conduct research into Reverse Code Engineering (RCE). The addition of the "+" sign in front of the nickname of a reverser signified membership in the +HCU. +HCU published a new reverse engineering problem annually. See also *Security hacker *Software cracking Software cracking (known as "breaking" mostly in the 1980s) is the modification of software to remove or disable features which are considered undesirable by the person cracking the software (software cracker), especially copy protection featur ... Notes and references External links *http://www.woodmann.com/crackz/Orc.htmIn search of an Enigma - the Hunt for the Old Red Cracker Unidentified ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Jon Lech Johansen
Jon Lech Johansen (born November 18, 1983 in Harstad, Norway), also known as DVD Jon, is a Norwegian programmer who has worked on reverse engineering data formats. He wrote the DeCSS software, which decodes the Content Scramble System used for DVD licensing enforcement. Johansen is a self-trained software engineer, who quit high school during his first year to spend more time with the DeCSS case. He moved to the United States and worked as a software engineer from October 2005 until November 2006. He then moved to Norway but moved back to the United States in June 2007. Education In a post on his blog, he said that in the 1990s he started with a book (''Programming the 8086/8088''), the web ("Fravia's site was a goldmine") and IRC ("Lurked in a x86 assembly IRC channel and picked up tips from wise wizards.") DeCSS prosecution After Johansen released DeCSS, he was taken to court in Norway for computer hacking in 2002. The prosecution was conducted by the Norwegian National A ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Brussels
Brussels (french: Bruxelles or ; nl, Brussel ), officially the Brussels-Capital Region (All text and all but one graphic show the English name as Brussels-Capital Region.) (french: link=no, Région de Bruxelles-Capitale; nl, link=no, Brussels Hoofdstedelijk Gewest), is a region of Belgium comprising 19 municipalities, including the City of Brussels, which is the capital of Belgium. The Brussels-Capital Region is located in the central portion of the country and is a part of both the French Community of Belgium and the Flemish Community, but is separate from the Flemish Region (within which it forms an enclave) and the Walloon Region. Brussels is the most densely populated region in Belgium, and although it has the highest GDP per capita, it has the lowest available income per household. The Brussels Region covers , a relatively small area compared to the two other regions, and has a population of over 1.2 million. The five times larger metropolitan area of Brusse ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microsoft Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for servers, and Windows IoT for embedded systems. Defunct Windows families include Windows 9x, Windows Mobile, and Windows Phone. The first version of Windows was released on November 20, 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Windows is the most popular desktop operating system in the world, with 75% market share , according to StatCounter. However, Windows is not the most used operating system when including both mobile and desktop OSes, due to Android's massive growth. , the most recent version of Windows is Windows 11 for consumer PCs and tablets, Windows 11 Enterprise for corporations, and Windows Server 2022 for servers. Genealogy By marketing ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Metastasized
Metastasis is a pathogenic agent's spread from an initial or primary site to a different or secondary site within the host's body; the term is typically used when referring to metastasis by a cancerous tumor. The newly pathological sites, then, are metastases (mets). It is generally distinguished from cancer invasion, which is the direct extension and penetration by cancer cells into neighboring tissues. Cancer occurs after cells are genetically altered to proliferate rapidly and indefinitely. This uncontrolled proliferation by mitosis produces a primary heterogeneic tumour. The cells which constitute the tumor eventually undergo metaplasia, followed by dysplasia then anaplasia, resulting in a malignant phenotype. This malignancy allows for invasion into the circulation, followed by invasion to a second site for tumorigenesis. Some cancer cells known as circulating tumor cells acquire the ability to penetrate the walls of lymphatic or blood vessels, after which they are able ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Squamous Cell Carcinoma
Squamous-cell carcinomas (SCCs), also known as epidermoid carcinomas, comprise a number of different types of cancer that begin in squamous cells. These cells form on the surface of the skin, on the lining of hollow organs in the body, and on the lining of the respiratory and digestive tracts. Common types include: * Squamous-cell skin cancer: A type of skin cancer * Squamous-cell carcinoma of the lung: A type of lung cancer * Squamous-cell thyroid carcinoma: A type of thyroid cancer * Esophageal squamous-cell carcinoma: A type of esophageal cancer * Squamous-cell carcinoma of the vagina: A type of vaginal cancer Despite sharing the name "squamous-cell carcinoma", the SCCs of different body sites can show differences in their presented symptoms, natural history, prognosis, and response to treatment. By body location Human papillomavirus infection has been associated with SCCs of the oropharynx, lung, fingers, and anogenital region. Head and neck cancer About 90% of cases ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Free Software
Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions. Free software is a matter of liberty, not price; all users are legally free to do what they want with their copies of a free software (including profiting from them) regardless of how much is paid to obtain the program.Selling Free Software
(gnu.org)
Computer programs are deemed "free" if they give end-users (not just the developer) ultimate control over the software and, subsequently, over their devices. The right to study and modify a computer program entails that

picture info

Wau Holland
Herwart Holland-Moritz, known as Wau Holland, (20 December 1951 – 29 July 2001) was a German computer security activist and journalist who in 1981 cofounded the Chaos Computer Club (CCC), one of the world's oldest hacking clubs. Career From 1979 onwards, Holland supported the film historian Hans-Michael Bock with the development of the filmographic database CineGraph - a lexicon for German-language films, which appeared as a loose-leaf collection from 1984. In 1981, Holland co-founded the Chaos Computer Club (CCC). From 1983 he was a columnist for the Berlin-based ''Die Tageszeitung'', often reporting on the BBS scene and the computer underground. In the same year, he also supervised the phototypesetting of one of the early books created entirely on a computer (Osborne 1). Holland also co-founded the CCC's hacker magazine ''Datenschleuder'' in 1984, which praised the possibilities of global information networks and powerful computers, and included detailed wiring di ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Chaos Computer Club
The Chaos Computer Club (CCC) is Europe's largest association of hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters (called ''Erfa-Kreise'') in various cities in Germany and the surrounding countries, particularly where there are German-speaking communities. Since 1985, some chapters in Switzerland have organized an independent sister association called the (CCC-CH) instead. The CCC describes itself as "a galactic community of life forms, independent of age, sex, race or societal orientation, which strives across borders for freedom of information…". In general, the CCC advocates more transparency in government, freedom of information, and the human right to communication. Supporting the principles of the hacker ethic, the club also fights for free universal access to computers and technological infrastructure as well as the use of open-source software. The CCC spreads an entre ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subcult ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Reverse Engineering
Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little (if any) insight into exactly how it does so. It is essentially the process of opening up or dissecting a system to see how it works, in order to duplicate or enhance it. Depending on the system under consideration and the technologies employed, the knowledge gained during reverse engineering can help with repurposing obsolete objects, doing security analysis, or learning how something works. Although the process is specific to the object on which it is being performed, all reverse engineering processes consist of three basic steps: Information extraction, Modeling, and Review. Information extraction refers to the practice of gathering all relevant information for performing the operation. Modeling refers to th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]