1 00:00:00,120 --> 00:00:03,450 So in this area will be finding that to reduce our dog. 2 00:00:03,600 --> 00:00:11,070 How so the broken countries of this period this information and you can return using the get together 3 00:00:11,070 --> 00:00:17,640 information function you're going to see all of these privileges we can finish the premises using this 4 00:00:17,650 --> 00:00:23,730 we are my comment but in our next video will be adjusting this privileges using another function. 5 00:00:24,090 --> 00:00:30,890 And here I can see I have this privilege assigned to but it is ever by default so that actually when 6 00:00:30,930 --> 00:00:37,950 you will be enabling this essential shutdown, which Bouchard does not competence, we don't have this 7 00:00:38,250 --> 00:00:39,750 privilege because it will disappear. 8 00:00:41,060 --> 00:00:48,360 So this privilege from visible to enable you need to first down the privileges you have. 9 00:00:48,720 --> 00:00:53,010 So that is going to be we are doing in this video. 10 00:00:53,610 --> 00:01:06,060 So if you need to access this token handle before that, we will open this process our get our current 11 00:01:06,060 --> 00:01:13,140 process handle so we can use this using process, not get current process that handle. 12 00:01:17,150 --> 00:01:19,550 And the return date is a pointer. 13 00:01:20,390 --> 00:01:21,440 The program will. 14 00:01:24,520 --> 00:01:27,100 And we'll be using this open process to again function. 15 00:01:30,520 --> 00:01:32,690 And it recites all at once. 16 00:01:32,710 --> 00:01:34,390 You bet that you do the. 17 00:01:45,560 --> 00:01:47,110 And the return type is bull. 18 00:01:50,620 --> 00:01:54,100 And the first parameter is, uh, process handle. 19 00:01:56,360 --> 00:01:57,620 That is a pointer. 20 00:01:58,970 --> 00:02:01,520 And the second one is a desert axis. 21 00:02:01,970 --> 00:02:02,720 With what axis? 22 00:02:02,720 --> 00:02:05,940 You are on board when these are broken. 23 00:02:06,770 --> 00:02:09,810 So I will be just grinding nine tokens. 24 00:02:09,810 --> 00:02:13,100 So you can just use this broken query. 25 00:02:13,100 --> 00:02:17,250 And the number for this is Doug inquiry the congestion. 26 00:02:18,170 --> 00:02:18,710 So. 27 00:02:21,040 --> 00:02:22,690 We consider this. 28 00:02:30,340 --> 00:02:32,410 In the broken quite easy question this value. 29 00:02:40,830 --> 00:02:49,470 And the pointer to this uh, uh, token handed sort of reference in the point that. 30 00:02:52,110 --> 00:02:53,490 Our token handle. 31 00:02:57,560 --> 00:02:59,270 So that's going to. 32 00:03:01,750 --> 00:03:03,820 Open process token off. 33 00:03:04,150 --> 00:03:07,450 The first one is the process, and that is the handle. 34 00:03:07,450 --> 00:03:10,210 And the second one is this token query. 35 00:03:11,260 --> 00:03:16,660 And the third one is the reference to first creating a pointer. 36 00:03:24,900 --> 00:03:32,970 And passing this token and output will be so you can't ignore the written library and just put this 37 00:03:32,970 --> 00:03:35,730 book resources equals to function. 38 00:03:36,330 --> 00:03:38,240 So we have this token handle. 39 00:03:38,880 --> 00:03:45,480 We need to get the information from this so we can do that using this function to get token information. 40 00:03:49,990 --> 00:03:54,880 And the first parameter is the token handle, and the second parameter is that broken information class. 41 00:03:55,990 --> 00:04:00,780 And if you go to this broken information class, this is the enum. 42 00:04:01,300 --> 00:04:05,560 So it starts with one and the remaining values are 24. 43 00:04:05,980 --> 00:04:13,000 Following the groups, etc. will be focusing on broken privileges structure. 44 00:04:13,810 --> 00:04:16,330 Under the facade, you'll also see the structure. 45 00:04:16,840 --> 00:04:18,850 And if you go to the token privileges. 46 00:04:26,140 --> 00:04:26,860 Here we have. 47 00:04:26,890 --> 00:04:31,270 The first one is the privilege count number of privileges a token. 48 00:04:31,600 --> 00:04:35,260 And the second one is a real structure. 49 00:04:35,260 --> 00:04:37,540 And that structure is rooted in attribute. 50 00:04:37,540 --> 00:04:42,820 So this really is a unique REIT that content that is the long. 51 00:04:43,030 --> 00:04:45,520 So if you go to these leading attributes. 52 00:04:49,950 --> 00:04:58,680 So first, let's define this rule, the net structure and instead you have this idea really is a unique 53 00:04:58,680 --> 00:04:59,250 value. 54 00:05:00,120 --> 00:05:02,570 It contains the low part and the higher part. 55 00:05:02,580 --> 00:05:04,500 It's just a long value. 56 00:05:06,170 --> 00:05:13,370 So based on that, what we're going to do is we're going to pitch the tape of the pyramid, we hope. 57 00:05:14,890 --> 00:05:17,440 So fortunate to get this structure. 58 00:05:30,720 --> 00:05:34,650 So we need to create another structure that is a new idea. 59 00:05:35,160 --> 00:05:36,330 So let's create that one. 60 00:05:42,020 --> 00:05:45,620 And it contains the low part and the hyper. 61 00:05:58,930 --> 00:06:01,510 So our researcher is successful. 62 00:06:04,340 --> 00:06:04,480 Ah. 63 00:06:04,550 --> 00:06:07,970 It's quite clear this route that routes. 64 00:06:21,900 --> 00:06:31,680 And the question is of the type fluid structure annuity, and they're going to need the D-word. 65 00:06:35,590 --> 00:06:36,280 Attributes. 66 00:06:36,430 --> 00:06:42,650 So in these attributes, we'll be placing the value to who get this privilege and will. 67 00:06:42,990 --> 00:06:46,480 So you see the slippery driver and this value is to. 68 00:06:53,430 --> 00:06:57,960 So we had to find this new data structure. 69 00:06:58,170 --> 00:07:01,290 So that's going to define our priority structure. 70 00:07:14,460 --> 00:07:19,730 The first one is the privilege or the number of privileges we have. 71 00:07:29,880 --> 00:07:34,680 And the second one is the idea of these structures. 72 00:07:43,590 --> 00:07:45,210 So we need to master this one. 73 00:07:48,900 --> 00:07:52,020 Martial arts and murder tied up by value added. 74 00:07:53,970 --> 00:07:56,220 And also we need to define the science constant. 75 00:07:57,120 --> 00:08:07,410 So it's constant at its 100 so interiority it will be I drew create this 100 members so 100 at our 400. 76 00:08:08,340 --> 00:08:11,820 So it's like a maximum value. 77 00:08:12,540 --> 00:08:20,070 If you take this to some one or two, whenever you have political like ten, so you can fit the ten 78 00:08:20,070 --> 00:08:26,550 privileges I address into this, uh, uh, for you are six sides of it. 79 00:08:26,790 --> 00:08:31,770 So we are declaring this hundred and we cannot changes are dynamically so we will be setting 100. 80 00:08:36,300 --> 00:08:37,000 Now let's go. 81 00:08:37,040 --> 00:08:42,450 And I think the TARDIS structure needs. 82 00:08:44,570 --> 00:08:46,370 So you can also copy this. 83 00:08:55,610 --> 00:08:56,880 Probably, you know. 84 00:09:03,080 --> 00:09:04,310 You can collapse in this one. 85 00:09:25,420 --> 00:09:27,400 The functionaries get to get information. 86 00:09:31,640 --> 00:09:34,550 And the first value is that I can handle. 87 00:09:39,350 --> 00:09:42,680 And the second one is the information class structure. 88 00:09:42,680 --> 00:09:47,660 Remember information class and remember sorry, the object. 89 00:09:49,100 --> 00:09:52,010 And the third one is the output. 90 00:09:53,200 --> 00:09:54,640 Of this token information. 91 00:09:54,730 --> 00:10:03,010 So whatever you specify here, you will get the pointer to this structure if you specify the token information 92 00:10:03,010 --> 00:10:04,900 class dot token bridges. 93 00:10:05,250 --> 00:10:10,270 When we getting the structure to that a pointer to this structure. 94 00:10:10,810 --> 00:10:12,910 So here again the description. 95 00:10:27,920 --> 00:10:29,960 And the next round is talking information then. 96 00:10:33,830 --> 00:10:41,270 So we need to pass the length of this structure we want to query. 97 00:10:54,620 --> 00:11:00,050 And now Poppy's output will also gives you the length of the structure. 98 00:11:01,370 --> 00:11:10,550 So to get the length of our structure faster will be will be just carrying without this pointer zero. 99 00:11:12,980 --> 00:11:15,830 Uh, to get the structure. 100 00:11:16,640 --> 00:11:25,100 So we'll be cutting the second time because we know the length and we can return the structure. 101 00:11:26,960 --> 00:11:27,240 Okay. 102 00:11:27,260 --> 00:11:29,600 So let's go and call this one. 103 00:11:29,630 --> 00:11:30,980 Get together in formation. 104 00:11:31,280 --> 00:11:38,150 So the first thing, getting the token privileges. 105 00:11:41,840 --> 00:11:43,290 Because we don't not yet. 106 00:11:43,310 --> 00:11:44,900 Again, can see this is a dynamic tape. 107 00:11:45,560 --> 00:11:50,000 We may expect uh, uh, five or six errors. 108 00:11:50,450 --> 00:11:54,610 So notice, uh, so at our we don't know. 109 00:11:54,680 --> 00:12:00,920 So that's why we are going to get the token information. 110 00:12:05,300 --> 00:12:07,640 And the first one is that I can handle. 111 00:12:08,150 --> 00:12:12,710 And the second one is our token information class. 112 00:12:12,710 --> 00:12:15,140 That token privileges. 113 00:12:24,130 --> 00:12:32,470 And a third one is we can just say 0.0 for no because we are not interested in getting any output. 114 00:12:32,470 --> 00:12:35,290 We are interesting only getting output of the rental. 115 00:12:36,730 --> 00:12:48,460 So we need to create a kind of prevalent, easy, constant zero and we passing this one here we rent. 116 00:12:50,750 --> 00:12:53,030 And the reference to prevalent. 117 00:12:58,380 --> 00:13:04,980 Now, if I go and print this problem, we should see actual number rather than zero. 118 00:13:05,490 --> 00:13:06,840 And also it will be. 119 00:13:12,110 --> 00:13:14,240 Using the cross handle. 120 00:13:17,530 --> 00:13:19,030 That is from Canada, too. 121 00:13:19,030 --> 00:13:19,840 Too, I think. 122 00:13:20,770 --> 00:13:21,310 Yes. 123 00:13:45,700 --> 00:13:53,650 So we cannot call this our handle does here automatically grow this we like to manage record but our 124 00:13:53,920 --> 00:13:58,050 dog can handle this and manage it because we are using this order and process took it. 125 00:13:58,240 --> 00:14:01,930 So at last we can grow sandy love dog can handle. 126 00:14:03,360 --> 00:14:06,930 And that's their press. 127 00:14:06,930 --> 00:14:10,230 Any key to continue? 128 00:14:16,210 --> 00:14:17,560 So if I go and run this. 129 00:14:19,470 --> 00:14:21,780 And here we can see the rent is 64. 130 00:14:26,410 --> 00:14:28,390 So there is actually that structure. 131 00:14:31,780 --> 00:14:33,980 Is there in this article. 132 00:14:34,000 --> 00:14:35,920 So we need to pitch that information. 133 00:14:41,810 --> 00:14:45,490 So we need to create a pointer to hold this metadata. 134 00:14:47,720 --> 00:14:48,380 So let's. 135 00:14:55,180 --> 00:14:56,320 Broken privileges. 136 00:14:59,060 --> 00:15:01,730 Martial art and memory. 137 00:15:02,210 --> 00:15:04,850 How much of a memory we want we want to hold? 138 00:15:04,850 --> 00:15:08,420 Is this much of the problem? 139 00:15:12,710 --> 00:15:18,770 I think we're not going to get any memory because we'll be getting in now. 140 00:15:18,790 --> 00:15:19,760 But point. 141 00:15:26,290 --> 00:15:27,600 So that changed. 142 00:15:27,820 --> 00:15:29,050 We are not zero. 143 00:15:33,240 --> 00:15:33,790 Get this. 144 00:15:33,860 --> 00:15:34,030 This? 145 00:15:35,430 --> 00:15:36,030 Ah, yes. 146 00:15:37,320 --> 00:15:39,360 So it should be safe anywhere. 147 00:15:39,750 --> 00:15:41,220 Get all the information off. 148 00:15:42,300 --> 00:15:43,950 The first one is spoken handle. 149 00:15:44,400 --> 00:15:46,470 And second one is as usual. 150 00:15:47,100 --> 00:15:48,270 Our privileges. 151 00:15:52,120 --> 00:15:52,570 Now. 152 00:15:52,570 --> 00:15:55,270 We need to pass this. 153 00:15:57,280 --> 00:15:57,850 BP. 154 00:16:05,130 --> 00:16:09,540 The informal sector is the prevalent and the reference to prevalent. 155 00:16:11,790 --> 00:16:14,950 So here we are sending an input and this one is output. 156 00:16:19,280 --> 00:16:24,750 Now we can try to put into the program. 157 00:16:24,830 --> 00:16:26,540 It should be the same as the previous. 158 00:16:30,620 --> 00:16:34,490 So again, we got the pointer that is BP. 159 00:16:36,090 --> 00:16:39,270 That is pointing to this structure broken. 160 00:16:40,470 --> 00:16:44,050 And here you can see the first one is the privilege card. 161 00:16:44,070 --> 00:16:45,930 The size is the for. 162 00:16:48,470 --> 00:16:53,120 And remaining we don't know the size of its challenges. 163 00:16:53,120 --> 00:16:53,720 64. 164 00:16:53,750 --> 00:16:57,590 We can say that 60, but we don't know the size. 165 00:16:58,130 --> 00:16:58,910 It may vary. 166 00:16:59,150 --> 00:17:05,660 So what we're going to do is we are going to first pitch this prediction and then we'll move over this. 167 00:17:08,000 --> 00:17:17,180 From this point, our plans for the end of this project and then we'll be printing out of this various. 168 00:17:20,990 --> 00:17:24,440 So first, let's bring to the parade count how many priorities we have. 169 00:17:33,720 --> 00:17:40,530 So we need to convert this point back to the sector we can use my pointer to. 170 00:17:42,040 --> 00:17:42,790 Structure. 171 00:17:44,190 --> 00:17:45,720 So pass that BP. 172 00:17:46,110 --> 00:17:54,180 And the second one is the actual bypass token privileges. 173 00:17:56,630 --> 00:18:00,170 So let's actually regard this as a deep point to. 174 00:18:17,650 --> 00:18:23,480 So we got the structure and we can now put into that BP, that privilege column. 175 00:18:25,000 --> 00:18:28,990 So if I go and run this and you can see we have the five privileges. 176 00:18:29,830 --> 00:18:32,200 So these are the five privileges. 177 00:18:34,900 --> 00:18:38,400 So we got the privilege gone and the next two. 178 00:18:39,550 --> 00:18:43,050 How do you find the starting of this route? 179 00:18:43,130 --> 00:18:43,580 All right. 180 00:18:44,080 --> 00:18:51,340 So here you can see the first one is gone and the starting the from the not onwards, you have this 181 00:18:51,340 --> 00:18:51,660 edit. 182 00:18:53,320 --> 00:18:54,610 So are we going to use? 183 00:18:59,140 --> 00:19:01,810 We can say first we are. 184 00:19:07,620 --> 00:19:10,170 Starting point is equals two. 185 00:19:12,180 --> 00:19:21,000 Actually, we need to see in knowing the period of we need to convert this pointer to the 64 bit and 186 00:19:21,000 --> 00:19:25,110 then we need to add the size of this. 187 00:19:26,850 --> 00:19:27,760 But it's count. 188 00:19:28,750 --> 00:19:29,650 So let's do that. 189 00:19:33,040 --> 00:19:39,490 So we hope that is pointing to the starting date for. 190 00:19:42,910 --> 00:19:43,410 Let's first. 191 00:19:43,930 --> 00:19:44,620 32. 192 00:19:48,120 --> 00:19:48,630 You need to. 193 00:19:48,630 --> 00:19:54,300 You can also write in the program that that was 64 bit systems. 194 00:19:59,150 --> 00:20:00,020 So he's off. 195 00:20:01,460 --> 00:20:01,910 You. 196 00:20:05,180 --> 00:20:05,560 Okay. 197 00:20:05,570 --> 00:20:12,670 So what we have done is we have converted this pointer to that and then we are adding the size of within 198 00:20:12,690 --> 00:20:22,130 to get the pointer to the first member of the factory of this root that we can fix before it's because 199 00:20:22,130 --> 00:20:22,610 of a change. 200 00:20:22,640 --> 00:20:30,190 Right click on this and go to build and turn this to any see any CPR to see. 201 00:20:32,870 --> 00:20:35,990 Now we have this starting point. 202 00:20:36,860 --> 00:20:38,690 Now, what we're going to do is we are going. 203 00:20:42,570 --> 00:20:47,280 Canvas this pointer pointing to the structure to actual structure. 204 00:20:47,340 --> 00:20:51,600 So we can say marshal that pointer to. 205 00:20:53,010 --> 00:20:53,760 Structure. 206 00:20:58,290 --> 00:21:00,420 And then we need a starting point. 207 00:21:02,200 --> 00:21:03,670 And that type of. 208 00:21:06,280 --> 00:21:06,620 Rude. 209 00:21:06,970 --> 00:21:08,010 And that's. 210 00:21:12,670 --> 00:21:17,230 Sort it's it's every year religion. 211 00:21:20,570 --> 00:21:22,190 And what I want to do is. 212 00:21:28,860 --> 00:21:31,400 I want to do this every not. 213 00:21:38,920 --> 00:21:40,420 We need to make this as public. 214 00:21:53,020 --> 00:21:55,240 I want to print to the high part and the low part. 215 00:22:00,110 --> 00:22:01,520 So let's gone from this. 216 00:22:03,980 --> 00:22:05,480 And we have some values. 217 00:22:05,960 --> 00:22:15,170 So the reserve function can't look up its name to convert these values into the corresponding name. 218 00:22:19,070 --> 00:22:20,090 So it's corporate this. 219 00:22:50,400 --> 00:22:52,170 The first is the system name. 220 00:22:52,170 --> 00:22:55,550 So it's, uh, uh, now that you can pass the whole. 221 00:22:59,330 --> 00:23:04,130 The second one is the pointer to the the lady with the priorities. 222 00:23:04,130 --> 00:23:05,330 No, not a target system. 223 00:23:05,660 --> 00:23:08,900 So we need to pass the pointer to this rouge structure. 224 00:23:10,970 --> 00:23:13,150 So we can see Pointer to Louie. 225 00:23:14,870 --> 00:23:16,850 And the third one is the name. 226 00:23:18,320 --> 00:23:18,530 Oh. 227 00:23:19,220 --> 00:23:22,430 So we can master this one. 228 00:23:25,240 --> 00:23:26,320 Martial arts. 229 00:23:27,790 --> 00:23:29,080 Unmanaged type dirt. 230 00:23:30,850 --> 00:23:35,740 The string so wide casting we are going to say spring bear that. 231 00:23:40,340 --> 00:23:42,750 And the last one is the rental. 232 00:23:42,920 --> 00:23:50,360 The rental this spring builder too to get the output. 233 00:23:50,900 --> 00:23:53,890 So if this Fed grow, it cannot output anything. 234 00:23:53,900 --> 00:23:59,430 So we need to, uh, specify like 50 or a hundred to hold this matter. 235 00:24:01,340 --> 00:24:04,940 So, of course, the name of the bridge cannot be more than 100. 236 00:24:05,060 --> 00:24:05,420 So. 237 00:24:11,530 --> 00:24:13,780 So friends in bigger doses. 238 00:24:19,020 --> 00:24:24,810 So we'll be seen as equals to. 239 00:24:26,220 --> 00:24:30,600 Hundred and then spring builder as be. 240 00:24:36,490 --> 00:24:43,960 So before that, we need to convert this structure to the pointer because this is a structure. 241 00:24:44,470 --> 00:24:46,780 We need to pass the pointer to this structure. 242 00:24:50,340 --> 00:24:55,400 So martial art structure 2.0. 243 00:24:56,220 --> 00:25:00,930 So we need to create a pointer in the PDR. 244 00:25:05,650 --> 00:25:08,620 That's a rude pointer. 245 00:25:10,730 --> 00:25:12,860 Martial arts etiquette sites. 246 00:25:20,010 --> 00:25:22,950 So how much of the size you want to allocate that is? 247 00:25:25,530 --> 00:25:26,550 Let's take this one. 248 00:25:27,510 --> 00:25:28,080 So. 249 00:25:30,070 --> 00:25:31,130 Martial art. 250 00:25:32,140 --> 00:25:32,680 He's off. 251 00:25:35,090 --> 00:25:37,520 And they don't really. 252 00:25:38,270 --> 00:25:39,230 So they should do fine. 253 00:25:39,470 --> 00:25:47,270 So what we're actually doing is we are getting the size of this large structure and then we are getting 254 00:25:47,270 --> 00:25:50,540 the pointer to hold that much of the structure. 255 00:25:51,140 --> 00:26:01,580 So whenever we convert this array to this pointer, you get this uh, uh, pointer so you can pass this 256 00:26:01,580 --> 00:26:05,060 to this look up name w function. 257 00:26:05,480 --> 00:26:08,360 So we are going to convert this structure to pointer. 258 00:26:08,360 --> 00:26:13,640 So which vector we want to convert array not really comma. 259 00:26:15,020 --> 00:26:18,170 And what we can do is the next is pointer. 260 00:26:19,190 --> 00:26:20,690 The third parameter is true. 261 00:26:21,870 --> 00:26:24,160 So we got this rule point structure. 262 00:26:24,180 --> 00:26:28,440 So all we can do is begin to look up. 263 00:26:32,850 --> 00:26:33,680 But name. 264 00:26:35,530 --> 00:26:44,440 And the first one is that the sternum, which is note and the pointer to this which to reduce fluid 265 00:26:44,440 --> 00:26:45,040 pointer. 266 00:26:45,850 --> 00:26:49,540 And the third one is the output that is as meat. 267 00:26:51,250 --> 00:26:54,770 And the last one is the length referencing. 268 00:27:00,390 --> 00:27:01,470 So we are good to go. 269 00:27:02,520 --> 00:27:05,070 We can bring the best builder to screen. 270 00:27:05,730 --> 00:27:07,530 This will give us the progress. 271 00:27:07,530 --> 00:27:09,750 We hope so that we are on this. 272 00:27:21,430 --> 00:27:22,780 So let's go and run this. 273 00:27:23,080 --> 00:27:27,430 And here you can see we got the prism and C shutdown privilege. 274 00:27:27,940 --> 00:27:30,210 So that is the first privilege we have. 275 00:27:31,990 --> 00:27:34,300 So we want to which are the privileges. 276 00:27:34,310 --> 00:27:36,820 So what we can do is we can loop for this one. 277 00:27:40,700 --> 00:27:42,590 So we have the starting point, right. 278 00:27:42,590 --> 00:27:46,370 So how much we want to add everytime we want to add everytime. 279 00:27:50,860 --> 00:27:53,620 The size of this. 280 00:27:55,040 --> 00:27:56,620 I love that structure. 281 00:27:56,660 --> 00:27:58,430 So that is what we're going to do now. 282 00:28:03,370 --> 00:28:06,760 So far in I use equals to do zero. 283 00:28:08,110 --> 00:28:09,240 Ah yes then. 284 00:28:10,180 --> 00:28:11,980 So how do we know? 285 00:28:11,980 --> 00:28:13,180 How do we help? 286 00:28:13,450 --> 00:28:15,810 By using this pilot privilege card. 287 00:28:15,940 --> 00:28:18,790 So this defines the number of police. 288 00:28:20,190 --> 00:28:27,570 If you're if you don't if you don't put this privilege part and if you put like, say, 20 or 30, you 289 00:28:27,570 --> 00:28:28,880 may get five privileges. 290 00:28:28,890 --> 00:28:36,420 And along with the not because we have created this, uh, array as the 100, 100, that is. 291 00:28:36,510 --> 00:28:38,070 So we're getting the real value. 292 00:28:38,850 --> 00:28:39,360 That's right. 293 00:28:39,360 --> 00:28:42,450 We want to limit our enumeration to this privilege count. 294 00:28:45,040 --> 00:28:45,640 I press? 295 00:28:45,640 --> 00:28:46,000 Press. 296 00:29:00,270 --> 00:29:05,550 So how do I get the starting point so we can start being starting point to. 297 00:29:10,180 --> 00:29:11,230 Starting point. 298 00:29:11,230 --> 00:29:15,790 They're not going to 64 press. 299 00:29:17,990 --> 00:29:23,360 So we can say these are the new temporary winter air. 300 00:29:27,110 --> 00:29:33,080 So we need to get to the starting point better and how much we want to add every time we want to add. 301 00:29:35,790 --> 00:29:37,620 The site martial outside of. 302 00:29:41,720 --> 00:29:44,710 A bus route that routes. 303 00:29:45,110 --> 00:29:51,710 So that much if you want if you skip this model the size you will get the pointer to the next edit. 304 00:29:52,610 --> 00:30:02,660 So I can just simply say here I in because we are looping, we want to skip these many number of bytes. 305 00:30:07,990 --> 00:30:09,010 So new in. 306 00:30:11,540 --> 00:30:14,330 Buying better or so. 307 00:30:14,330 --> 00:30:16,820 Make sure these brackets are okay. 308 00:30:16,910 --> 00:30:17,930 So we are good to go. 309 00:30:19,530 --> 00:30:23,250 Somewhere in the starting point or to be integer. 310 00:30:24,530 --> 00:30:28,340 And then we are adding this much the size every time. 311 00:30:31,850 --> 00:30:40,400 So changes to tempo for inter and you get the regulatory structure and we are printing them. 312 00:30:43,180 --> 00:30:44,530 So I think we are good to go. 313 00:30:45,970 --> 00:30:47,410 So let's run this. 314 00:30:55,370 --> 00:30:55,840 Okay. 315 00:30:55,850 --> 00:30:56,720 We got some. 316 00:30:57,020 --> 00:30:58,610 We have got the. 317 00:31:03,650 --> 00:31:06,020 One of the few privileges we did not get. 318 00:31:06,200 --> 00:31:11,390 The remaining two we got the values. 319 00:31:11,390 --> 00:31:14,030 But I was able to put into them. 320 00:31:15,330 --> 00:31:16,260 So I think. 321 00:31:48,420 --> 00:31:51,960 So let's first copy this. 322 00:31:53,350 --> 00:31:53,870 To year. 323 00:32:14,510 --> 00:32:17,180 I think this these sites are different, I guess. 324 00:32:36,980 --> 00:32:38,810 So it's a martial art. 325 00:32:39,530 --> 00:32:40,400 So he's off. 326 00:32:44,360 --> 00:32:45,410 And they are to. 327 00:32:56,730 --> 00:32:58,440 Let's put another brackets here. 328 00:33:02,950 --> 00:33:04,090 So let's run this again. 329 00:33:28,310 --> 00:33:31,880 I think that sends 232. 330 00:33:44,940 --> 00:33:48,840 Still we are getting the different to where it is for this. 331 00:33:51,810 --> 00:33:56,160 So I have found this error because of this unit. 332 00:33:56,370 --> 00:34:03,810 So these are this high bar should be the integer, not b, I should not be the long because the long 333 00:34:03,810 --> 00:34:06,330 Aug three takes eight bytes. 334 00:34:06,510 --> 00:34:09,660 So we got that error again. 335 00:34:10,320 --> 00:34:12,450 And now let's go and run this one. 336 00:34:16,400 --> 00:34:18,980 And here we can see regard in that same order. 337 00:34:20,120 --> 00:34:21,750 Down 1093 and the. 338 00:34:23,320 --> 00:34:25,240 And rebranding these two. 339 00:34:26,440 --> 00:34:29,740 So you can also see these are good values here. 340 00:34:30,740 --> 00:34:34,820 The hard part is always zero and only the lower part us. 341 00:34:37,250 --> 00:34:38,690 So that's it for this video. 342 00:34:38,720 --> 00:34:40,220 So sorry for these mistakes. 343 00:34:40,490 --> 00:34:42,050 These are stereotypes. 344 00:34:42,050 --> 00:34:44,840 You need to ask these very carefully otherwise. 345 00:34:45,710 --> 00:34:54,720 The point gets are we get to the wrong location and we converting that to structure and obviously we 346 00:34:54,780 --> 00:34:56,390 get the wrong values.