edi x12

Discover edi x12, include the articles, news, trends, analysis and practical advice about edi x12 on alibabacloud.com

Delphi Image Processing-Gaussian blur

, that is, taking the pixel (x, y) as the center, to (x-radius, Y) and (x + radius, Y) after the pixels are multiplied by weights, the new pixels are obtained and written to the corresponding points on the target image. The process ends. Since the above processing process only performs a "Ten" operation on each pixel of the image, the operation on each pixel point is greatly reduced, and the greater the fuzzy length, the more reduced. As mentioned above, the Q = 3 and r = 5 Fuzzy Operations only

Functions required for transparent forms

: Baiyun district .. 1. dib32-bit, pre-multiplication alpha proc AlphaPreMul uses ebx edi, pBitDst,pDstRect,dwDstWight local dwWight:DWORD,dwHight:DWORD ;--------------------------------------- mov edi,[pBitDst] mov edx,[pDstRect] ;(p,q) mov eax,[edx+RECT.right] test eax,eax jz .exit mov [dwWight],eax mov eax,[edx+RECT.bottom] test e

Implement OOP using assembly

--------------------------------------------------------------------------------. Data; InitializationBEGIN_INITDd offset Shap_destructor_FunctDd offset Shap_getArea_FunctDd offset Shap_setColor_FunctDd NULLEND_INIT--------------------------------------------------------------------------------. CodeShape_Init PROC uses edi esi lpTHIS: DWORD; Actual call InitializationSET_CLASS Shape; Set edi assmue to Shap

In Windows 7x86, the kernel module NT (ntkrpamp module) source code learning

In Windows 7x86, the implementation of the kernel module NT (that is, the ntkrpamp module: Offset machine code command nt! Memset: 83c8ce40 8b54240c mov edX, dword ptr [esp + 0ch] 83c8ce44 8b4c2404 mov ECx, dword ptr [esp + 4] 83c8ce48 85d2 test edX, edx83c8ce4a 744f je nt! Memset + 0x5b (83c8ce9b) 83c8ce4c 33c0 XOR eax, eax83c8ce4e 8a442408 mov Al, byte PTR [esp + 8] 83c8ce52 57 push edi83c8ce53 8bf9 mov EDI, 10983fa04 CMP edX, 483c8ce58 7231 JB nt!

Common functions in VB [ZT]

ECx, dword ptr [dwmovenum]SHR eax, ClRETMovebitr endp; //////////////////////////////////////// ///////////////////////////Bin2dec proc pbin: DWORD ; Argument checkMoV eax, dword ptr [pbin]Test eax, eaxJZ @ exitPush ESIMoV ESI, eaxXOR eax, eaxXOR edX, EDXClD@@:LodsbTest Al, AlJZ finalflag; FinalCMP Al, 30 h; 0JZ isbinCMP Al, 31 H; 1JZ isbinJnz @ B Isbin:Add edX, EDXLea edX, [edX + eax-30 h]JMP @ BFinalflag:MoV eax, EDXPop ESI@ Exit:RETBin2dec endp; //////////////////////////////////////// /////

Delphi Image Processing-color phase/saturation adjustment (continued)

: integer; var table: tgraytable); ASM push ebx cmp eax,-255 jge @ 1 mov eax,-255 JMP @ 2 @ 1: CMP eax, 255 jle @ 2 mov eax, 255 @ 2: Push eax mov EBX, 255 fild dword ptr [esp] fwait mov [esp], EBX fidiv dword ptr [esp] // bright/255 fwait XOR ECx, ECx test eax, eax JG @ loop xor ebx, EBX // mask = bright> 0? 255: 0 @ loop: mov [esp], ECx XOR [esp], EBX fild dword ptr [esp] fmul ST (0), ST (1) fistp dword ptr [esp] fwait mov eax, [esp] add eax, ECx mov [edX], Al // table [I] = (I ^ mask) * brigh

Discussion on protection technology of virtual machine

parameters, we need to translate the push command. Depending on the object of the push, different implementations are required:VPUSHREG32:; register into the stack. ESI points to the memory address of the bytecodeMov Eax,dword Ptr[esi]; Get the offset address of the register in the VMCONTEXT structure from the pseudo code (byte code)ADD esi,4; The VMCONTEXT structure preserves the values of each register. The structure is saved inside the stack.Mov eax,dowrd ptr [

Use the program to modify PE so that it displays a message box

Modifyfile,pmapaddr; Modify memory block contentsInvoke unmapviewoffile,pmapaddr; unlock file mappings. endifInvoke Closehandle,hmap; Close memory-mapped file. endifInvoke CloseHandle, hfile; Close file. endifRetWinMain ENDP; Get the file name to process; Return: If eax=null indicates that no file name is provided for processing; otherwise eax point to the filename addressGetFileName ProcInvoke Getfilenamefromcommandline,addr FileName. If Eax==nullCall Getfilenamefromdialog. endifRetGetFileName

Using NTLDR to enter RING0 and analysis of mgf virus Technology

to add CALLGATE for MGF virus: _ DwFlag ----- bit 0: 0 = ntldr, 1 = PE; bit 1:0 = mem, 1 = file;Bit 2: 0 = auto (ansi/unicode), 1 = ansi......................... Else; _ dwFlag; write CALLGATE if the file is NTLDRLea esi, szGdtData [ebx]Mov edi, @ lpFileMapMov ecx, @ dwFileSize@@:Inc ediPush esiPush ediPush ecxMov ecx, 10 hRepz cmpsbPop ecxPop ediPop esiLoopnz @ B In NTLDR, search for RING0 and CS in 16 bytes. After DS finds the d

We also discuss how to insert a dynamic GIF into RichEdit.

call drawimage. Siid_framedimensiontime textequ Framedimensiontime guid siid_framedimensiontime Drawimage proc uses esi edi ebx hdc, X, YLocal dwticksLocal hgraphicsLocal RT: rectLocal hscrdc, htempdc, hbitmap. If m_ppropertyitem; Calculate the currently displayed frame through the Frame delay data and the elapsed timeInvoke timegettime; timegettime precision is 1 msSub eax, m_dwframe0tickXOR edX, EDXMoV ECx, 10Div ECxMoV dwticks, eaxMoV ESI, m_pprop

CRC16 common several standard algorithms and C language to achieve __ algorithm

CRC16 common standards are used in various specifications, the principle of its algorithm is basically consistent, that is, in the data input and output differences, below the standards of the differences listed, and give the C language algorithm implementation. Crc16_ccitt: Polynomial x16+x12+x5+1 (0x1021), initial value 0x0000, low in front, high in the post, results and 0x0000 different or Crc16_ccitt_false: Polynomial x16+

Linux under the at& Getting started with the T syntax (GNU as Assembly Syntax)

the operation, such as Movl $foo,%eax equivalent to the Intel mov eax, Word ptr fooLong jump and call format is different, at/T is ljmp $section, $offset, and Intel is the JMP Section:offsetThe main difference is these, the other details are many, the following gives a specific example to illustrate#cpuid. S Sample Program. Section. DataOutput. ASCII "The processor Vendor ID is ' xxxxxxxxxxxx ' \ n". section. Text. globl _start_start:MOVL,%eaxCpuidMOVL $output,%ediMovl%ebx, (%

C ++ (opening part) 01 from the perspective of Assembly

carried out in assembly, let's talk about some personal opinions. Next, we will conduct some small tests and explain them in assembly language. You can do it together. (1) Char name [] and char * Name [CPP] View plaincopy 1: 2:VoidProcess () 3 :{ 00401020 push EBP 00401021 mov EBP, ESP 00401023 sub ESP, 4ch 00401026 push EBX 00401027 push ESI 00401028 push EDI 00401029 Lea EDI

The program monitors and reads memory data from the DOS/BIOS resident memory to winnt.

-level page tableMoV FS: [eax + ECx], EDX; modify the ing of our code in the physical memoryMoV dword ptr fs: [eax], 103 h; Modify physical page 0 (that is, bios/DOS zone ing to 80000000 H). Endif; Note: winnt does not use bios/DOS pages, that is, physical pages 0); ######################################## ######################################## ###################Call memscansapiaddr. If EDI; ### find the API function address in the memory, eax-> zw

C ++ from the perspective of assembly (opening part)

talk about some personal opinions. Next, we will conduct some small tests and explain them in assembly language. You can do it together. (1) char name [] and char * name 1: 2: void process () 3 :{ 00401020 push ebp 00401021 mov ebp, esp 00401023 sub esp, 4Ch 00401026 push ebx 00401027 push esi 00401028 push edi 00401029 lea edi, [ebp-4Ch] 0040102C mov ecx, 13 h 00401031 mov eax, 0 CCCCCCCCh 00401036 re

Making cross-platform Shellcode

, [edx + esi]; mov esi, [esi + 0x78]; Lea ESI, [edx + esi]; mov edi, [esi + 0x1c]; Lea EDI, [edx + edi]; MOV[EBP-0X04], EDI; mov edi, [esi + 0x20];

Shellcode avoiding stack protections sample --- vallez/29A

------------------------------------------------------------------------------------------- . 78462fdf: AB stosd. 78462fe0: 5f pop EDI. 78462fe1: c20400 retn 00004. Bytes ------------------------------------------------------------------------------------------- . 784635ec: 8bc6 mov eax, ESI. 784635ee: 5f pop EDI. 784635ef: 5E pop ESI. 784635f0: C3 retn Bytes -----------------------------------------------

Implementation of simple thread Injection

, hWnd, hModule, ShellSize, addr WrittenInvoke CreateRemoteThread, hProcess, 0, 0, addr Shellcode, hModule, 0, addr dwTidInvoke ExitProcess, 0End start In fact, this section: Shellcode procPush 00403008 HCall LoadLibraryPush 00403013 HCall LoadLibraryInvoke URLDownloadToFile, NULL, addr szURL, addr szSaveFile, NULL, NULLInvoke ShellExecute, 0, 0, addr szSaveFile, 0, SW_SHOWInvoke ExitThread, 0RetShellcode endp You can convert it into a machine code, so that you do not need a subroutine. Directly

One of the compatible kernels: How does reactos implement system calling?

there are also functions prefixed with KE and Ki in the reactos kernel. The prefix ke indicates that it belongs to the "kernel" module. Note that the so-called "kernel" module in Windows is only part of the kernel, rather than the entire kernel. I will discuss this in "talking about wine" later. The prefix Ki refers to the functions related to interrupt response and processing in the kernel. Kisystemservice () is an assembly program which serves as system_call () in the Linux kernel. This Code

Talking about compatible kernel: reactos how to realize System Call http://www.linuxsir.org/bbs/showthread.php? T = 232200

frame on the stack.* The following are already on the stack.*/// SS + 0x0// ESP + 0x4// Eflags + 0x8// Cs + 0xc// EIP + 0x10Pushl $0 // + 0x14Pushl % EBP // + 0x18Pushl % EBX // + 0x1cPushl % ESI // + 0x20Pushl % EDI // + 0x24Pushl % FS // + 0x28 /* Load PCR selector into FS */Movw $ pcr_selector, % BXMovw % BX, % FS /* Save the previous exception list */Pushl % FS: kpcr_exception_list // + 0x2c /* Set the exception handler chain Terminator */Movl $0

Total Pages: 15 1 .... 4 5 6 7 8 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.