What is reverse engineering?
Some terms are self -explaining. This is the case of reverse engineering that literally separates something and puts it together. This can be done physically or practically, and the intention is to find out how something works to create something similar. Sometimes reverse engineering is carried out to improve existing creation, while other cases of reverse engineering include theft technology. This was especially the case of weapons throughout the history of the war.
They are not just weapons that are subject to reverse engineering. Everyday things, such as vehicles, DVDs and appliances, are subject to intensive controls in neighborhoods around the world. Some companies will get used to importing goods from other countries, decompose these goods from a piece, and then using reverse engineering to create an OWN.
Reverse engineering is also performed in the virtual world. Computer artists and scientists practice reverse engineering by creating 3D models in the real world and then deconstructing them practically to see howthey work. Occasionally they put them back together, in exactly or a slightly different way. The arrival of heavy servers and the graphic apartment allowed this to be desirable.
Computers also practice reverse engineering at a basic level. One form of this kind of reverse engineering is located. DECOMPILLING is a process during which the computer converts low -level information (computer code) into a high level format (ASCII text and numbers) to allow people to read things like instructions and web cells. Common decompositions include file transfer from one user to another, such as Exchange data or images in E -mail or to convert encoding that has been damaged or has never been completed. Decompation can also come in the form of security violations in which the hacker uses reverse engineering to reconstruct data that someone so desperately wanted to hide by encryption.
Another dualThe use of reverse engineering is to create and prevent computer viruses. The creators of viruses immerse themselves in the offal of a computer code to find places that would bury their creations. By rebuilding machine code as a source code, the virus creator can find what he is looking for. On the other hand, these actions are people who try to prevent or destroy computer viruses. They also use reverse engineering to deconstruct the virus itself and destroy or predict harmful executable files.