This is possible to do with a (very) good understanding of the assembly language for the specific computer that the code is intended for.
This code is used by crackers with the intent of fooling applications, such as Web forms, into accepting code used for exploits. Typically, such exploits involve buffer overflows.
Search Encyclopedia
|
Featured Article
|