Now I have a device sending bytes using the BUS..now can I capture what is it going inside this BUS?
And about the second point:
For example Windows (Close Source) has some algorithms inside it.. they encrypts some bytes and use them or send them to some devices.. for example.. and so.. so now can I capture this algorithm?? and how?? Is it hard or easy proces?? again it is close source not open source..and the algorithm is compiled with the OS ofcourse (inside the source)
And also can I encrypt some bytes sent by a BUS without been decrypted or reversed engineering??
Waiting your replies to discuss this point as I want to know much more about it..
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
The Relationships Diagram is a good way to get an overall view of what a database is keeping track of. It is also where relationships are defined. A relationship specifies how two tables connect to each other.
As you build tables in Microsoft Ac…