001.Creating IDA Plug-ins with C# or VB6 (原文)444K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2G2M7r3g2F1M7X3y4W2i4K6u0W2L8%4u0Y4i4K6u0r3j5i4u0@1K9h3y4D9k6i4y4Q4x3V1k6X3N6h3I4D9i4K6g2X3N6X3W2W2N6#2)9J5c8U0p5K6i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4c8f1k6Q4b7V1y4Q4z5o6S2Q4c8e0S2Q4b7f1k6Q4z5e0q4Q4c8e0k6Q4z5e0k6Q4z5o6N6Q4c8f1k6Q4b7V1y4Q4z5o6W2Z5N6s2c8H3i4K6y4m8i4K6u0r3i4K6u0r3j5X3u0K6x3g2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6y4m8z5o6l9^5x3g2)9J5c8Y4y4Z5L8%4N6@1K9s2u0W2j5h3c8Q4x3X3g2H3K9s2m8Q4x3@1k6K6i4K6y4p5i4K6t1$3N6r3S2J5k6h3q4V1K9h3c8Q4x3@1b7K6x3e0x3^5y4l9`.`.
002.Introduction to IDAPython 576K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2G2M7r3g2F1M7X3y4W2i4K6u0W2L8%4u0Y4i4K6u0r3j5i4u0@1K9h3y4D9k6i4y4Q4x3V1k6X3N6h3I4D9i4K6g2X3N6X3W2W2N6#2)9J5c8U0p5I4
003.How to get the Virtual Address of a PE section with IDA (原文)6c1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0D9L8$3N6K6i4K6u0W2L8i4y4V1L8W2)9J5k6h3y4G2L8g2)9J5c8X3N6W2k6X3k6F1k6i4u0Q4x3V1k6S2M7X3y4Z5K9i4k6W2i4K6u0r3x3U0l9H3y4g2)9J5c8U0l9&6i4K6u0r3x3e0y4Q4x3V1j5@1y4U0f1I4z5o6m8Q4x3X3g2S2M7%4m8^5i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4c8f1k6Q4b7V1y4Q4z5o6S2Q4c8e0S2Q4b7f1k6Q4z5e0q4Q4c8e0k6Q4z5e0k6Q4z5o6N6Q4c8f1k6Q4b7V1y4Q4z5o6W2Z5N6s2c8H3i4K6y4m8i4K6u0r3i4K6u0r3j5X3u0K6x3g2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6y4m8z5o6l9^5x3g2)9J5c8Y4y4Z5L8%4N6@1K9s2u0W2j5h3c8Q4x3X3g2H3K9s2m8Q4x3@1k6K6i4K6y4p5i4K6t1$3N6r3S2J5k6h3q4V1K9h3c8Q4x3@1b7K6x3e0x3^5y4l9`.`.
(以上三篇由jhlqb认领,第1,3篇已完成)
004.Windows CE ARM debugger primer eb1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3N6$3W2F1j5$3g2Q4x3V1k6A6L8X3c8W2P5q4)9J5k6h3S2@1L8b7`.`. (译文) c8bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0T1M7K6q4Q4x3X3g2H3k6h3c8A6P5g2)9J5k6h3y4G2L8g2)9K6b7e0R3H3z5o6q4Q4x3V1k6K6K9r3!0%4N6r3S2J5k6h3q4V1i4K6u0W2M7r3S2H3i4K6y4r3M7#2)9K6c8q4)9J5y4Y4c8Z5M7X3g2S2k6r3W2V1i4K6y4p5x3K6p5^5y4o6t1`.
(由 alpsdew认领,已完成)
005.Using the IDA debugger to unpack an "hostile" PE executable f2bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3N6h3&6H3j5h3y4C8i4K6g2X3M7r3g2Q4x3V1k6E0j5h3&6#2j5h3I4Q4x3X3g2Z5N6r3@1`.
(经查,005已由4nil翻译,http://bbs.pediy.com/showthread.php?threadid=9811)
006.Using the Universal PE Unpacker Plug-in included in IDA Pro
4.9 to unpack compressed executables 51dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3N6h3&6H3j5h3y4C8i4K6g2X3M7r3g2Q4x3V1k6#2L8Y4m8S2j5$3E0A6L8X3N6Q4x3X3g2H3k6r3j5`.
(由arthurchen翻译完成)
007.Remote debugging with IDA Pro 219K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3k6Y4u0W2k6h3k6A6L8r3g2K6i4K6u0r3M7X3g2E0L8%4c8W2k6r3u0Y4i4K6u0W2M7r3c8X3
(1031由arthurchen认领)
008.Using IDA Pro's tracing features 7c2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3k6Y4u0W2k6h3k6A6L8r3g2K6i4K6u0r3N6s2u0S2j5$3W2F1k6#2)9J5k6i4m8V1k6R3`.`.
(1101由chenzping认领,已完成)
009.Graphing with IDA Pro f0bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3k6%4u0S2M7r3S2K6i4K6u0r3k6%4u0S2M7r3S2K6i4K6u0W2M7r3c8X3
(由arthurchen翻译完成)
010.Using IDA Pro's Debugger a1dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3k6r3g2T1N6h3N6Y4k6i4u0Q4x3V1k6V1k6h3u0#2k6$3N6W2M7W2)9J5k6i4m8V1k6R3`.`.
011.Customizing IDA Pro (原文)3bbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3j5%4g2K6N6r3!0E0K9i4A6W2i4K6u0r3j5%4g2K6N6r3!0E0K9i4A6W2i4K6u0W2M7r3c8X3i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4c8f1k6Q4b7V1y4Q4z5o6S2Q4c8e0S2Q4b7f1k6Q4z5e0q4Q4c8e0k6Q4z5e0k6Q4z5o6N6Q4c8f1k6Q4b7V1y4Q4z5o6W2Z5N6s2c8H3i4K6y4m8i4K6u0r3i4K6u0r3j5X3u0K6x3g2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6y4m8z5o6l9^5x3g2)9J5c8Y4y4Z5L8%4N6@1K9s2u0W2j5h3c8Q4x3X3g2H3K9s2m8Q4x3@1k6K6i4K6y4p5i4K6t1$3N6r3S2J5k6h3q4V1K9h3c8Q4x3@1b7K6x3e0j5#2z5l9`.`.
(010及011由jdxyw于9.2认领,已完成)
012.High level constructs width IDA Pro 4d1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3k6r3q4@1j5i4y4@1M7Y4g2U0N6q4)9J5c8X3c8S2N6r3q4K6N6s2u0#2j5%4c8Q4x3X3g2H3k6r3j5`.
(经查,012已由WiNrOOt翻译,http://bbs.pediy.com/showthread.php?threadid=7244。IDA站点上的内容做过更新,但发动不大)
013.Using IDC to analyze encrypted code 598K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3K9h3c8S2j5$3c8W2j5%4u0&6M7s2c8Q4x3X3g2Z5N6r3@1`.
014.IDA Pro Bit Fields Tutorial e8cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3K9h3c8S2N6s2g2@1L8%4u0A6j5h3I4Q4x3V1k6T1K9i4c8X3K9h3g2D9k6s2y4Q4x3V1k6A6L8X3c8W2P5q4)9J5k6h3S2@1L8b7`.`.
015.IDA Pro Union Tutorial 2e5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3K9h3c8S2N6s2g2@1L8%4u0A6j5h3I4Q4x3V1k6#2L8X3W2G2L8Y4y4Q4x3V1k6A6L8X3c8W2P5q4)9J5k6h3S2@1L8b7`.`.
016.Interactive Disassembler Pro Enumerated Types Tutorial e85K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3K9h3c8S2N6s2g2@1k6h3&6#2L8g2)9J5k6h3S2@1L8b7`.`.
(译文) 17dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0T1M7K6q4Q4x3X3g2H3k6h3c8A6P5g2)9J5k6h3y4G2L8g2)9K6b7e0R3H3z5o6q4Q4x3V1k6K6K9r3!0%4N6r3S2J5k6h3q4V1i4K6u0W2M7r3S2H3i4K6y4r3M7#2)9K6c8q4)9J5y4Y4c8Z5M7X3g2S2k6r3W2V1i4K6y4p5x3K6p5^5y4o6t1`.
(13-16由alpsdew认领,已完成)
017.Fast Library Identification and Recognition Technology (原文)e4fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8S2N6r3q4J5k6i4y4U0N6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6A6k6r3q4T1j5i4y4W2i4K6u0r3k6X3I4A6M7Y4c8Q4x3X3g2Z5N6r3#2Q4x3U0k6F1j5Y4y4H3i4K6y4n7 (译文)9c6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0T1M7K6q4Q4x3X3g2H3k6h3c8A6P5g2)9J5k6h3y4G2L8g2)9K6b7e0R3H3z5o6q4Q4x3V1k6K6K9r3!0%4N6r3S2J5k6h3q4V1i4K6u0W2M7r3S2H3i4K6y4r3M7#2)9K6c8q4)9J5y4Y4c8Z5M7X3g2S2k6r3W2V1i4K6y4p5x3K6p5$3x3K6j5`.
(由月中人认领,已完成)
019.Unpacking malicious software using IDA Pro extensions 6e8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2M7X3y4G2M7W2)9J5k6h3c8W2i4K6u0r3K9h3c8S2M7r3q4D9j5h3y4W2i4K6u0r3M7r3q4H3k6i4u0K6i4K6u0r3N6h3&6H3j5h3y4C8K9h3&6Y4i4K6g2X3L8h3q4D9N6$3q4J5k6g2)9#2k6Y4g2K6K9h3&6Y4i4K6g2X3K9h3c8S2i4K6g2X3M7s2u0G2i4K6g2X3k6i4S2@1k6h3&6K6K9h3!0F1M7#2)9J5k6i4m8V1k6R3`.`.
(1018由cehn认领,11.04完成)
020.REVERSE CODE ENGINEERING: AN IN-DEPTH ANALYSIS OF THE BAGLE VIRUS 321K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2M7X3y4G2M7W2)9J5k6h3c8W2i4K6u0r3K9h3c8S2M7r3q4D9j5h3y4W2i4K6u0r3M7r3q4H3k6i4u0K6i4K6u0r3j5X3q4Y4L8r3g2Q4y4h3k6S2L8X3q4D9P5i4y4A6M7#2)9#2k6Y4k6Q4x3X3f1I4i4K6u0W2x3q4)9J5k6i4m8V1k6R3`.`.
(0919由Arhat认领,已完成)
021.Analyzing Worms and Network Traffic using Compression 185K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3q4J5P5r3W2$3i4K6u0W2L8%4u0Y4i4K6u0r3M7r3c8X3i4K6u0r3j5%4y4Q4x3X3g2o6f1W2)9J5c8U0l9#2x3o6b7H3y4o6f1`.
(由cehn认领,已完成)
022.Alien Autopsy, reverse engineering Win32 Trojans on Linux 286K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3I4#2M7X3S2I4i4K6u0W2j5$3!0E0i4K6u0r3j5h3I4A6k6h3&6Q4x3X3g2H3k6r3j5`.
023.Reverse Engineering Hostile Code cf9K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2G2N6i4y4W2j5i4u0E0P5g2)9J5k6h3&6W2N6q4)9J5c8Y4c8W2j5$3S2Q4x3V1k6J5k6i4k6W2M7Y4y4W2i4K6g2X3k6h3&6Y4K9h3&6W2k6i4u0A6L8X3N6Q4y4h3k6Z5L8%4y4@1K9h3I4W2i4K6g2X3j5$3!0V1k6g2)9J5k6i4m8V1k6R3`.`.
(1018由cehn认领,已完成)
024.Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code 716K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3I4D9i4K6u0W2L8h3W2@1i4K6u0W2k6h3c8#2i4K6u0r3d9g2y4f1i4K6u0r3M7s2g2T1M7#2)9J5c8U0l9K6x3e0l9J5y4#2)9#2k6W2u0S2j5X3g2C8i4K6u0W2M7r3c8X3
(1025由aalloverred认领,已完成)
025.Challenges in getting formal with viruses 500K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4S2j5%4y4Q4x3X3g2D9L8%4g2A6M7$3W2S2L8X3q4Q4x3X3g2W2k6s2g2Q4x3V1k6U0P5h3u0W2M7Y4y4W2j5%4g2J5K9i4c8&6i4K6u0r3M7r3q4H3k6i4u0K6i4K6u0r3c8$3g2@1N6r3W2F1k6@1k6G2M7X3#2S2L8q4)9J5k6q4k6A6M7Y4g2K6b7Y4g2D9L8r3g2@1K9h3&6Q4x3X3c8e0k6i4l9J5x3o6l9K6i4K6u0W2M7r3c8X3 (译文) eafK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3u0T1M7K6q4Q4x3X3g2H3k6h3c8A6P5g2)9J5k6h3y4G2L8g2)9K6b7e0R3H3z5o6q4Q4x3V1k6K6K9r3!0%4N6r3S2J5k6h3q4V1i4K6u0W2M7r3S2H3i4K6y4r3M7#2)9K6c8q4)9J5y4Y4c8Z5M7X3g2S2k6r3W2V1i4K6y4p5x3K6t1H3y4e0V1`.
(由月中人认领,已完成)
027. Software Protection and Application Security: Understanding the Battleground 9fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4U0M7#2)9J5k6h3y4S2M7X3I4W2N6r3!0F1i4K6u0W2j5$3q4Q4x3V1k6Q4x3U0f1%4c8i4m8S2N6h3I4$3i4K6u0r3M7r3q4H3k6i4u0K6i4K6u0r3M7$3!0X3N6s2m8J5L8%4b7^5j5g2)9J5k6i4m8V1k6R3`.`.
(1018由cehn认领)
028.Software Watermarking Via Assembly Code Transformations 25fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4K6i4K6u0W2M7$3A6K6N6g2)9J5k6h3g2V1N6g2)9J5c8X3k6S2j5%4g2D9N6s2W2Q4x3V1k6K6N6r3q4E0M7q4)9J5c8Y4y4@1N6h3c8W2L8Y4c8K6i4K6u0r3j5%4x3J5z5e0S2d9k6i4m8G2M7Y4c8e0L8h3W2@1j5g2)9J5k6i4m8V1k6R3`.`.
(1027由hhbrook认领)
029.Digital Genome Mapping and Advanced Binary Malware Analysis 0b2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8C8j5Y4A6S2i4K6u0W2L8%4u0Y4i4K6u0r3k6r3q4@1j5g2)9J5c8X3y4S2M7Y4u0W2M7X3q4Q4y4h3k6W2M7X3c8W2L8s2W2A6i4K6g2X3g2V1t1J5x3o6l9@1i4K6u0W2M7r3c8X3i4@1g2r3i4@1u0o6i4K6R3^5i4@1f1&6i4K6W2o6i4K6R3H3i4@1f1^5i4@1p5$3i4K6R3I4i4@1f1@1i4@1u0n7i4@1p5K6i4@1f1%4i4K6V1H3i4K6R3$3i4@1g2r3i4@1u0o6i4K6R3&6i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4K6S2r3i4@1p5$3i4@1f1@1i4@1t1^5i4K6R3H3i4@1f1@1i4@1t1^5i4@1q4m8i4@1f1&6i4K6V1K6i4@1u0q4i4@1f1$3i4K6S2q4i4@1p5#2i4@1g2r3i4@1u0o6i4K6W2m8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6Q4x3X3c8K6k6h3y4#2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6%4k6h3u0D9L8$3N6Q4x3V1k6S2M7X3y4Z5K9i4k6W2M7#2)9J5c8X3y4S2M7Y4u0W2M7X3q4Q4y4h3k6W2M7X3c8W2L8s2W2A6i4K6g2X3g2V1t1J5x3o6l9@1i4K6u0W2M7r3c8X3
(已由月中人翻译,已完成,感谢月中人的大力支持)
KKbing 介绍的5d4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6G2L8$3c8E0j5h3&6F1i4K6u0W2j5$3!0E0i4K6u0r3K9%4u0G2j5X3q4J5i4K6u0r3i4@1f1$3i4K6W2o6i4K6R3&6i4@1f1#2i4K6R3%4i4@1p5H3i4@1f1%4i4@1q4r3i4K6R3%4i4@1f1#2i4K6R3#2i4@1t1K6i4@1f1@1i4@1u0m8i4K6S2q4d9f1c8m8 pro 的教学,但比较老,有意可自行前往挑选。
我认领021.Analyzing Worms and Network Traffic using Compression 41eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3q4J5P5r3W2$3i4K6u0W2L8%4u0Y4i4K6u0r3M7r3c8X3i4K6u0r3j5%4y4Q4x3X3g2o6f1W2)9J5c8U0l9#2x3o6b7H3y4o6f1`.
再认领027. Software Protection and Application Security: Understanding the Battleground 101K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4U0M7#2)9J5k6h3y4S2M7X3I4W2N6r3!0F1i4K6u0W2j5$3q4Q4x3V1k6Q4x3U0f1%4c8i4m8S2N6h3I4$3i4K6u0r3M7r3q4H3k6i4u0K6i4K6u0r3M7$3!0X3N6s2m8J5L8%4b7^5j5g2)9J5k6i4m8V1k6R3`.`.
认领
023.Reverse Engineering Hostile Code ab1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2G2N6i4y4W2j5i4u0E0P5g2)9J5k6h3&6W2N6q4)9J5c8Y4c8W2j5$3S2Q4x3V1k6J5k6i4k6W2M7Y4y4W2i4K6g2X3k6h3&6Y4K9h3&6W2k6i4u0A6L8X3N6Q4y4h3k6Z5L8%4y4@1K9h3I4W2i4K6g2X3j5$3!0V1k6g2)9J5k6i4m8V1k6R3`.`.
022.Alien Autopsy, reverse engineering Win32 Trojans on Linux f81K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3I4#2M7X3S2I4i4K6u0W2j5$3!0E0i4K6u0r3j5h3I4A6k6h3&6Q4x3X3g2H3k6r3j5`.
019.Unpacking malicious software using IDA Pro extensions 016K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2M7X3y4G2M7W2)9J5k6h3c8W2i4K6u0r3K9h3c8S2M7r3q4D9j5h3y4W2i4K6u0r3M7r3q4H3k6i4u0K6i4K6u0r3N6h3&6H3j5h3y4C8K9h3&6Y4i4K6g2X3L8h3q4D9N6$3q4J5k6g2)9#2k6Y4g2K6K9h3&6Y4i4K6g2X3K9h3c8S2i4K6g2X3M7s2u0G2i4K6g2X3k6i4S2@1k6h3&6K6K9h3!0F1M7#2)9J5k6i4m8V1k6R3`.`.