- Mastering Reverse Engineering
- Reginald Wong
- 79字
- 2021-06-10 19:40:23
Memory
When a Windows executable file executes, the system allocates a memory space, reads the executable file from the disk, writes it at predefined sections in the allocated memory, then allows the code to execute from there. This block of memory is called a process block and is linked to other process blocks. Basically, every program that executes consumes a memory space as a process.
The following screenshot shows a Windows Task Manager's view of the list of processes:

推薦閱讀
- Extending Symfony2 Web Application Framework
- 白話網絡安全2:網安戰略篇
- Web漏洞分析與防范實戰:卷1
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 軟件開發安全之道:概念、設計與實施
- 硬黑客:智能硬件生死之戰
- 互聯網企業安全高級指南
- 網絡安全態勢感知
- INSTANT Apple Configurator How-to
- Kali Linux高級滲透測試(原書第4版)
- 云計算安全:關鍵技術、原理及應用
- 從實踐中學習Nmap滲透測試
- Instant OSSEC Host-based Intrusion Detection System
- Blockchain Development with Hyperledger
- 網絡空間安全實踐能力分級培養(I)