Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

3 Neutral

About Petra835

  • Rank
    Junior Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Thank you for sharing this! The archives are password protected, though. What's the password?
  2. My only problem with telegram is that I don't want to give my phone number. I tried several temporary ones but the ones that worked had already been used.
  3. What I don't like about mega is that they can partially delete a folder so one has to check to make sure everything is still there. Also, there's a quota so free users with a static IP are out of luck.
  4. Don't be lazy. There's even a link to amazon in the opening post. The description there says it's for beginners.
  5. As others have said, usually, C, C++, assembly, but, in general, it depends on the malware. If a malware is written in a language X and it's interpreted, then you need to know X. If it's compiled to some kind of machine language Y, then you need to know Y. For general reverse engineering, I can recommend 2 advanced books: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly These books will either fascinate or scare you away.
  6. I wouldn't count on that. He/she says: "Buy Long-term Premium Accounts To Support Me & Max Speed".
  7. Just remove the trailing [/hide] from the url.
  • Create New...