일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
- Numpy
- mean
- index
- RNN
- pycharm
- mariadb
- Lotto
- ipad
- SciPy
- 삼성소프트웨어멤버십
- GT-S80
- LSTM
- Splunk
- keras
- pandas
- pip
- javascript
- Series
- CNN
- imread
- Button
- synology
- Python
- E-P1
- 알고리즘
- dataframe
- GitHub
- SPL
- install
- DFS
- Today
- Total
목록공부/Cpp (45)
잠토의 잠망경
Introduction I was recently trying to steal strings from another program's listview control. You need to pass a pointer so it knows where to put the string. Normally this wouldn't be a problem, but because Windows uses virtual memory pointers are not valid across programs. Virtual memory is how Windows deals out memory to all it's programs. It makes programs think they have 2 Gb of memory to use..
Abstract After having published my article about process-wide API spying, I received plenty of encouraging messages - readers have generally accepted my model of hooking function calls. In this article, we will extend our model to kernel- mode spying, and hook the API calls that are made by our target device driver. We will also introduce a brand-new way of communication between the kernel-mode ..
Contents Introduction A "code-what"? Unless you have spent some time working in the area of reverse engineering, chances are you have not heard of the term "codecave" before. If you have heard of it, you might not have read a clear definition of it or quite understand what it is or why it is useful. I have even asked seasoned assembly programmers about the term before and most of them had not he..
Introduction Eyes are the most important features of the human face. So effective usage of eye movements as a communication technique in user-to-computer interfaces can find place in various application areas. Eye tracking and the information provided by the eye features have the potential to become an interesting way of communicating with a computer in a human-computer interaction (HCI) system...
Introduction This article demonstrates a method to try and solve a common problem hated by most C++ programmers: memory leaks and memory overruns. The method used in this article is to track all memory allocated by the program. It also has basic protection checks whether the memory written to the allocated block has overrun the number of bytes actually allocated. This method also lets you organi..