Sunday, November 3, 2013

what are some reverse engineering techniques?

3d scanner low cost
 on Scanner 3D con hardware low cost e strumenti free/open source
3d scanner low cost image



Kevin7





Answer
Reverse engineering of machines
As computer-aided design (CAD) has become more popular, reverse engineering has become a viable method to create a 3D virtual model of an existing physical part for use in 3D CAD, CAM, CAE or other software. The reverse-engineering process involves measuring an object and then reconstructing it as a 3D model. The physical object can be measured using 3D scanning technologies like CMMs, laser scanners, structured light digitizers or computed tomography. The measured data alone, usually represented as a point cloud, lacks topological information and is therefore often processed and modeled into a more usable format such as a triangular-faced mesh, a set of NURBS surfaces or a CAD model.
Reverse engineering is also used by businesses to bring existing physical geometry into digital product development environments, to make a digital 3D record of their own products or to assess competitors' products. It is used to analyse, for instance, how a product works, what it does, and what components it consists of, estimate costs, and identify potential patent infringement, etc. Value engineering is a related activity also used by businesses. It involves de-constructing and analysing products, but the objective is to find opportunities for cost cutting.

Reverse engineering of software
The three main groups of software reverse engineering are
1. Analysis through observation of information exchange, most prevalent in protocol reverse engineering, which involves using bus analyzers and packet sniffers, for example, for accessing a computer bus or computer network connection and revealing the traffic data thereon. Bus or network behaviour can then be analyzed to produce a stand-alone implementation that mimics that behaviour. This is especially useful for reverse engineering device drivers. Sometimes, reverse engineering on embedded systems is greatly assisted by tools deliberately introduced by the manufacturer, such as JTAG ports or other debugging means. In Microsoft Windows, low-level debuggers such as SoftICE are popular.
2. Disassembly using a disassembler, meaning the raw machine language of the program is read and understood in its own terms, only with the aid of machine-language mnemonics. This works on any computer program but can take quite some time, especially for someone not used to machine code. The Interactive Disassembler is a particularly popular tool.
3. Decompilation using a decompiler, a process that tries, with varying results, to recreate the source code in some high-level language for a program only available in machine code or bytecode.

Reverse engineering of integrated circuits/smart cards
Reverse engineering is an invasive and destructive form of analyzing a smart card. The attacker grinds away layer by layer of the smart card and takes pictures with an electron microscope. With this technique, it is possible to reveal the complete hardware and software part of the smart card. The major problem for the attacker is to bring everything into the right order to find out how everything works. Engineers try to hide keys and operations by mixing up memory positions, for example, busscrambling. In some cases, it is even possible to attach a probe to measure voltages while the smart card is still operational. Engineers employ sensors to detect and prevent this attack. This attack is not very common because it requires a large investment in effort and special equipment that is generally only available to large chip manufacturers. Furthermore, the payoff from this attack is low since other security techniques are often employed such as shadow accounts.
http://en.wikipedia.org/wiki/Reverse_engineering

is it really better than kaspersky?




cyrax_07


is nod32 really better thaN kaspersky? others say yes others not..im confused...

i need explanation pls... because i ran a full scan computer with kaspersky it didnt detect anything while nod32 detected a virus..



Answer
Nod32/kaspersky both r my fav.

but kaspersky is damn slow...

but nod32 is ultra fast, no more slow down system,

nod32 work nice with 3D games....

so no more slowdown games

and price...

Nod 32......$39.00 for one year and I can't seem to find the cost of a renewal fee..

Kaspersky...$39.95


***********


This is simply a software vendor using available tests to show their product in the best possible light.

1. NOD probably has the best heuristics of any AV at the present time BUT it needs this as it is slower than a number of vendors in adding new malware to their database, particularly if it is slow-spreading.

2. It is a very fast scanner but not the fastest. Again they have reported its performance against SELECTED rivals. Command AV and F-Prot, for example, IME, are faster on-demand scanners than NOD.

3. Again the RAM footprint figures are again selective. Command, F-Prot, Dr Web and KAV 6 all have lower memory footprints than NOD.

4. ITW detection over at VirusBulletin does not show the true picture as you can fail the test with false positives and yet still pass the test even if you do not score 100% detection!!! However, NOD is very good at ITW threats.

It is better to look at a range of testing sites to get an overall picture.

NOD is a very good AV and it has shown hugh improvements in its detection rate in the last 12-18 months and version 3 is on the way.

But it has deliberately chosen to give high priority to the tests over at VirusBulletin and recently av-comparatives so it can use the results over on its main site and in its Advertisements in the Computer Press. Compared to other vendors, they make sure they are prepared for ITW testing for VirusBulletin as the samples are known prior to testing. Moreover, they make sure that they add the MISSED zoo malware samples from any av-comparatives test to their database. Some vendors however, such as Dr Web, are very slow to add these missed samples and therefore they would not use this test on their web-site!

Overall this is very good PR by Eset.

ALL AV vendors obviously use any information in the best way to highlight the main reasons why you should choose their product. After all they are commercial vendors!!!!!!

I have been a licensed user of both NOD and KAV for many years and both will give you good protection.

But do not expect a balanced viewpoint on a KAV forum. But then again I would not expect a fair discussion if KAV was discussed on the NOD forum at Wilders.

*********

Here is Comapison
http://www.eset.com/products/compare.php

******** Voted For Nod32




Powered by Yahoo! Answers

Title Post: what are some reverse engineering techniques?
Rating: 100% based on 99998 ratings. 5 user reviews.
Author: Yukie

Thanks For Coming To My Blog

No comments:

Post a Comment