-
Course Introduction -
Course outline
five 05. Review of pointer modification data 05. Review of pointer modification data [37:30] Start learning six 06. Evil modification of strings and calling functions 06. Evil modification of strings and calling functions [06:43] Start learning