I shouldn’t be posting this because the guy doesn’t deserve any traffic he might get by writing this. But it’s so funny that I cannot resist (yes, I’m weak).

The blog post is called “I Can Crack Your App With Just A Shell (And How To Stop Me)” and it’s available here. I especially like his advice because it shows he doesn’t know nothing about protecting apps and I have the feeling on that second article he links being a complete ripoff from one or two articles around the web. Just cut the crap and publish tutorials on interesting stuff or create some cool packers and that sort of things so we can have fun targets to reverse! Yes, this post is also crap.

Ok, back to Dtrace User guide! Almost reaching the juicy parts. I still have to find a way to make DTrace useful in reversing protections (by this I mean faster and easier than disassembling the binaries) but it will help me with this exit(173) thing (learning some stuff about OS X that I never bothered to).

Have fun,

Just found out two interesting links (from root labs rdist blog), one book and one article.