Solved

ASM

Posted on 1998-12-08
12
382 Views
Last Modified: 2013-11-22
I need to learn ASSEMBLER.  Does anybody know all the commands in ASM and thier functions?  Please E-Mail me at :
  <VIBESPRO@MAILCITY.COM>.
0
Comment
Question by:VIBESPRO
  • 4
  • 2
  • 2
  • +4
12 Comments
 
LVL 5

Expert Comment

by:scrapdog
ID: 1216394
I know the PERFECT site for you.  You must not be that desperate though :)
0
 
LVL 2

Expert Comment

by:omsec
ID: 1216395
i would suggest to get a beginners book about Assembler Program Language like you would do it for any other Compiler. I have a full list with description and example of each Mnemonic (Command) but its over 2MG big text
0
 
LVL 5

Expert Comment

by:scrapdog
ID: 1216396
ASM is difficult to pick up by just looking at mnemonics...the underlying concepts are what takes a while to understand.

I suppose I will stop teasing and give you the web site.  2 points is rather cheap though :)

http://webster.ucr.edu/Page_asm/ArtofAssembly/artofasm.html

Read the whole book, or at least the first half.  You could get by reading the first half, since the second half is more advanced topics like compiler design.  It is 1500 pages.  If you want to learn assembly well, there are no shortcuts.  It is well-written and not too difficult to follow.
0
 
LVL 27

Expert Comment

by:BigRat
ID: 1216397
May I (politely as possible) ask why you NEED to learn Assembler? It is the urgency in the question which intrigues me.
0
 
LVL 4

Accepted Solution

by:
jack_p50 earned 10 total points
ID: 1216398
0
 
LVL 2

Author Comment

by:VIBESPRO
ID: 1216399
Thanx everyone, especially SCRAPDOG.  The info you gave was the best, but I can't give you the points because you did not propose an answer.  Next time.  And I will increase the points.

0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Expert Comment

by:kccdl20
ID: 22216083
Both links on here are broken, the 1st one is nonexsistant and the second redirects me to an ekommerce shop
0
 
LVL 7

Expert Comment

by:Inteqam
ID: 22216928
man, you are talking about 10 years
0
 
LVL 4

Expert Comment

by:jack_p50
ID: 22216987
oh boy, it really is 10 years. am i getting older or what... seems like it was almost yesterday.
www.archive.org has archived scrapdog's link, mine is lost in the sands of time...
http://web.archive.org/web/19980215021824/http://webster.ucr.edu/Page_asm/ArtofAssembly/artofasm.html
0
 
LVL 4

Expert Comment

by:jack_p50
ID: 22217004
correction: here are the archived contents of the link i posted back then
http://web.archive.org/web/20000819003802/www.chesworth.com/pv/languages/assembly_language_tutor.htm
0
 
LVL 7

Expert Comment

by:Inteqam
ID: 22217124
:), i even forgot pascal
0
 
LVL 4

Expert Comment

by:jack_p50
ID: 22217208
i even forgot C++ :)
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now