Compose your message:
Email Address :
Password:
OR
Your Name :
REAL Email Address :
(PRIVATE)
Subject :
Please type in your message (no HTML codes) :
[quote]On 06/13/2011 @ 19:41, Lord Crass wrote : After going through all of the (encrypted) p-code, it seems that only 8 instructions are used, and they're all straightforward. : : Once I've cleaned it all up, I'll post an updated, commented disassembly for this protection that covers the virtual machine, p-code, and drive code protection, as well has how to remove all this extra protection while leaving everything else intact (intro title, fast loader, etc) -- [/quote]
File to attach:
(limit 250000 bytes)
SECURITY QUESTION
I had 9 pecans and then I threw away 7 of them.
How many do I have now?
: