Rtl - Runtime Library


There are many Rtl routines for many operations:

  • Initializing and using strings

  • Initializing and using threads

  • Initializing and using resources

  • Initializing and using critical sections

  • Initializing and using security objects

  • Manipulating memory

  • Manipulating data types

  • Processing exceptions

  • Access processing

  • Timer operations

  • Heap operations

  • Compression and decompression operations

  • IPv4 and IPv6 operations




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net