Gonzalez Posted September 11, 2009 Report Posted September 11, 2009 Parti 1-8, bafta!http://securitytube.net/Assembly-Primer-for-Hackers-(Part-1)-System-Organization-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-2)-Virtual-Memory-Organization-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-3)-GDB-Usage-Primer-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-4)-Hello-World-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-5)-Data-Types-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-6)-Moving-Data-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-7)-Working-with-Strings-video.aspxhttp://securitytube.net/Assembly-Primer-for-Hackers-(Part-8)-Unconditional-Branching-video.aspx-Gonzalez Quote
ashish771 Posted March 3, 2012 Report Posted March 3, 2012 Btw, SecurityTube now offers professional certifications for Wireless, Metasploit etc. and also gives our free course material to universities for use: SecurityTube Trainings Quote