Reverse Engineering Malware (Part 1)
I remember many years ago, well just a few years actually, when I first heard the term reverse engineering. The words meant nothing to me at that time. Once my knowledge of computer security began to expand from the networking protocols to other fields such as intrusion detection, and web application security, I decided to revisit reverse engineering. After having been active in computer security for several years I was able to understand why having the ability to reverse engineer an executable was of use.
Furthermore, the skills necessary to undertake such a task were far clearer to me as well. Knowing that you want to do something is only half the battle. The other half is simply understanding how to approach the task that you have set for yourself. Reverse Engineering Malware (Part 1)
Back to: PC Security, privacy news