1 00:00:00,900 --> 00:00:05,580 Hello, viewers, and welcome back again, and as I told you, we still don't know what episode then 2 00:00:05,580 --> 00:00:13,950 to turn your listeners and we not by God's grace, we are on lesson eight, which is a summary of all 3 00:00:13,950 --> 00:00:20,960 what you've done from introduction to how to watch a program. 4 00:00:21,180 --> 00:00:24,630 So I'm going to show you some of what you did. 5 00:00:25,920 --> 00:00:29,960 So I me try to open something right here. 6 00:00:34,010 --> 00:00:41,030 From the swines, I mean, in the current warming mood, it is 7 00:00:43,870 --> 00:00:48,110 this one, this one perfect. 8 00:00:49,690 --> 00:00:53,030 OK, well, let me try to find it so you see one. 9 00:00:56,240 --> 00:00:57,320 OK, so. 10 00:01:01,890 --> 00:01:04,400 In charge of one side for you to see. 11 00:01:04,750 --> 00:01:13,870 So before you put a stop to it, this is the way to run the program to observe in behavior by using 12 00:01:13,870 --> 00:01:18,860 what they detected easy when I showed you. 13 00:01:19,270 --> 00:01:22,270 OK, so you have to run the program into the environment. 14 00:01:22,280 --> 00:01:29,980 So as the second point, the programming designed to analyze the people that you need to be in the entry 15 00:01:29,980 --> 00:01:30,370 point. 16 00:01:30,400 --> 00:01:40,050 OK, I mean by the people who can do software based on race and it's into point and market to get out 17 00:01:40,060 --> 00:01:47,170 and get to our entry point, then you load that into the program of its system for a day and then jumps 18 00:01:47,170 --> 00:01:49,250 in order to avoid showing a 19 00:01:52,390 --> 00:02:01,000 bad message instead of to show a good mix and synch for proper instructions to patch and assemble a 20 00:02:01,000 --> 00:02:03,140 new fashion to play the audience. 21 00:02:04,180 --> 00:02:11,220 And after that passion, if I like how I did it in the previous tutorial and then you punch in it, 22 00:02:11,830 --> 00:02:15,610 and as I show you in all these presents, we use this for months. 23 00:02:16,510 --> 00:02:24,160 They did their own step over, step into the queue to return around to the initial instruction we use 24 00:02:24,160 --> 00:02:29,040 all throughout the program when you pack in patching patchiness software. 25 00:02:29,410 --> 00:02:35,890 So that's the main important thing, is to always underline the piece of application before you load 26 00:02:35,890 --> 00:02:40,210 it into the bag or assistive for DVD and all. 27 00:02:40,210 --> 00:02:45,740 What we are doing is to get a good message no to one simple message. 28 00:02:45,760 --> 00:02:55,320 OK, so we always try to place or setup a proper instruction or a simple instruction to play the audio 29 00:02:55,330 --> 00:02:57,940 so they come about points. 30 00:02:58,090 --> 00:03:01,390 OK, now you've been doing some good ones. 31 00:03:01,390 --> 00:03:07,870 Whether you understand the corporate India, you are moving into the advanced method, which people 32 00:03:07,870 --> 00:03:15,750 will also like because it's going to be the graphical user interface, how you crack software. 33 00:03:15,940 --> 00:03:18,280 So it's going to be a big challenge. 34 00:03:18,710 --> 00:03:28,180 OK, so this was a cracking command interface program for applications and why I'm going to do graphical 35 00:03:28,510 --> 00:03:30,800 user interface tracking. 36 00:03:31,190 --> 00:03:39,430 So this was all the summary on the web of what we did for introduction to and I hope you had some knowledge 37 00:03:39,430 --> 00:03:40,800 about all this. 38 00:03:41,080 --> 00:03:49,840 So I know some programs to try to stop perhaps sampling it or I'll give you the website after this so 39 00:03:49,840 --> 00:03:55,510 that you be able to would always to download some application and try your hands. 40 00:03:55,870 --> 00:04:01,870 So how about tracking reverse engineering the application where de severability got this, where you 41 00:04:01,870 --> 00:04:02,590 can do this? 42 00:04:02,590 --> 00:04:08,670 As I told you earlier, some applications are difficult to engineer or reverse it. 43 00:04:09,160 --> 00:04:11,800 OK, but you do have an ability. 44 00:04:11,800 --> 00:04:18,510 You can get the based application and try to create a patch for it would increase. 45 00:04:18,820 --> 00:04:23,360 So there's been a summary of the whole command interface. 46 00:04:23,380 --> 00:04:27,340 Cracking, of course, is part of the console. 47 00:04:27,340 --> 00:04:28,930 Ribhi I put it like this. 48 00:04:28,970 --> 00:04:30,220 So while this course. 49 00:04:30,610 --> 00:04:38,820 OK, so I hope by now you may be able to do this thing with your friends and told them you had a big 50 00:04:38,830 --> 00:04:49,280 boss and be able to command line interface applications to see you in advance data and be able to do 51 00:04:49,280 --> 00:04:57,110 with a graphical user interface what people want to see like interactive, making a lot of changes in 52 00:04:57,110 --> 00:04:57,910 the applications. 53 00:04:58,360 --> 00:04:58,930 Thank you. 54 00:04:58,990 --> 00:05:01,380 Is he would put.