Reverse Engineering Hostile Code Anthony Pell 1 min read Nov 23, 2004 This article outlines the process of reverse engineering hostile code. Prev: Identifying A Deleted Account Next: Format String Exploition