<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4189040760447531254</id><updated>2026-03-26T13:19:10.700-07:00</updated><category term="Knowledge"/><category term="Information"/><category term="Computer"/><category term="Programming"/><category term="Science"/><category term="Software"/><category term="OpenSource"/><category term="Security"/><category term="Visual Basic"/><category term="Assembler"/><category term="Delphi"/><category term="My Program"/><category term="Tutorial"/><category term=".NET"/><category term="C#"/><category term="C++"/><category term="PHP"/><category term="RE"/><category term="SQL"/><category term="Database"/><category term="Ebook"/><category term="Ollydbg"/><category term="ASP"/><category term="Biology"/><category term="DB2"/><category term="FreeBSD"/><category term="Healthy"/><category term="MD5"/><category term="MySQL"/><category term="Oracle"/><category term="Sybase"/><title type='text'>Digital World for Knowledge and Information</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>31</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-1057357418623884103</id><published>2009-08-11T12:48:00.001-07:00</published><updated>2009-08-11T12:48:07.873-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Assembler"/><category scheme="http://www.blogger.com/atom/ns#" term="C++"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Ebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>C++ Inline Assembler With MASM32</title><content type='html'>&lt;p&gt;This Book very Nice to Upgrade Your Skill for Assembler and C++ Programming. You will Interest of Assembler &amp;amp; C++ if you Read this Book.Invisible Recomended for ALL in the Word for have the Book.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;If U Like Me, Enjoy With Me&lt;/strong&gt;&lt;/p&gt; &lt;span class=&quot;fullpost&quot;&gt;   &lt;p&gt;&lt;strong&gt;&lt;a href=&quot;http://www.ziddu.com/download/6003980/MASM.rar.html&quot; target=&quot;_blank&quot;&gt;Download Here&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;    &lt;p&gt;&lt;strong&gt;Invisible-Digital&lt;/strong&gt;&lt;/p&gt; &lt;/span&gt;  </content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/1057357418623884103/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/c-inline-assembler-with-masm32.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1057357418623884103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1057357418623884103'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/c-inline-assembler-with-masm32.html' title='C++ Inline Assembler With MASM32'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-6905163778423768547</id><published>2009-08-08T10:46:00.001-07:00</published><updated>2009-08-08T10:56:37.397-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="C++"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>10 Source Code C++ &amp; Library by Invisible</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Free Source CPP by Invisible&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Travel Agency&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Telecomunication&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Rail&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Quiz &lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-COmputer Quiz&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-PlaceMen&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Music Player&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Hotel Information System&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Hospital Information System&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;-Book Shop System&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Don&#39;t Never ME, If U Like Me, Enjoy With Me&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Usefull For U ALL :D&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF9900;&quot;&gt;&lt;a href=&quot;http://kewlshare.com/dl/484b851b7fbd/CProjects_by_Invisible.rar.html&quot;&gt;Download 1&lt;/a&gt;&lt;/span&gt;&lt;/b&gt; | &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;&lt;a href=&quot;http://www.ziddu.com/download/5962029/CProjectsbyInvisible.rar.html&quot;&gt;Download 2&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&quot;Invisible-Digital&quot;&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/6905163778423768547/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/10-source-code-c-library-by-invisible.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/6905163778423768547'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/6905163778423768547'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/10-source-code-c-library-by-invisible.html' title='10 Source Code C++ &amp; Library by Invisible'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-3363370076724221187</id><published>2009-08-04T09:51:00.000-07:00</published><updated>2009-08-04T10:23:31.297-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Assembler"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Ebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="RE"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>&quot;Ebook&quot; Assembly Reference for Programming by Invisible</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;This Ebook for Assembly Programmer by Randal Hyde Compiled by Invisible.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Consists of several Chapters, That Is :&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Section One:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Machine Organization&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER ONE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;DATA REPRESENTATION&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.0 - Chapter Overview&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.1 - Numbering Systems&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.1.1 - A Review of the Decimal System&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.1.2 - The Binary Numbering System&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.1.3 - Binary Formats &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.2 - Data Organization &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.2.1 - Bits &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.2.2 - Nibbles &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.2.3 - Bytes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.2.4 - Words &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.2.5 - Double Words&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.3 - The Hexadecimal Numbering System &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.4 - Arithmetic Operations on Binary and Hexadecimal Numbers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.5 - Logical Operations on Bits&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.6 - Logical Operations on Binary Numbers and Bit Strings&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.7 - Signed and Unsigned Numbers  &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.8 - Sign and Zero Extension &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.9 - Shifts and Rotates &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.10 - Bit Fields and Packed Data &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.11 - The ASCII Character Set&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.12 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.13 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.13.1 Installing the Software &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.13.2 Data Conversion Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.13.3 Logical Operations Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.13.4 Sign and Zero Extension Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.13.5 Packed Data Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.14 Questions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;1.15 Programming Projects&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWO:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;BOOLEAN ALGEBRA&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.0 - Chapter Overview&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.1 - Boolean Algebra &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.2 - Boolean Functions and Truth Tables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.3 - Algebraic Manipulation of Boolean Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.4 - Canonical Forms &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.5 - Simplification of Boolean Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.6 - What Does This Have To Do With Computers, Anyway? &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.6.1 - Correspondence Between Electronic Circuits and Boolean Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.6.2 - Combinatorial Circuits &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.6.3 - Sequential and Clocked Logic&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.7 - Okay, What Does It Have To Do With Programming, Then?&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.8 - Generic Boolean Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.9 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.9.1 Truth Tables and Logic Equations Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.9.2 Canonical Logic Equations Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.9.3 Optimization Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.9.4 Logic Evaluation Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.10 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.11 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;2.12 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER THREE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;SYSTEM ORGANIZATION&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1 - The Basic System Components &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1.1 - The System Bus &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1.1.1 - The Data Bus &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1.1.2 - The Address Bus &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1.1.3 - The Control Bus &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1.2 - The Memory Subsystem &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.1.3 - The I/O Subsystem &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.2 - System Timing &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.2.1 - The System Clock &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.2.2 - Memory Access and the System Clock &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.2.3 - Wait States &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.2.4 - Cache Memory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3 - The 886, 8286, 8486, and 8686 &quot;Hypothetical&quot; Processors &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.1 - CPU Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.2 - The Arithmetic &amp;amp; Logical Unit &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.3 - The Bus Interface Unit &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.4 - The Control Unit and Instruction Sets &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.5 - The x86 Instruction Set &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.6 - Addressing Modes on the x86 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.7 - Encoding x86 Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.8 - Step-by-Step Instruction Execution&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.9 - The Differences Between the x86 Processors&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.10 - The 886 Processor &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.11 - The 8286 Processor &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.12 - The 8486 Processor &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.12.1 - The 8486 Pipeline &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.12.2 - Stalls in a Pipeline &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.12.3 - Cache, the Prefetch Queue, and the 8486 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.12.4 - Hazards on the 8486 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.3.13 - The 8686 Processor &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.4 - I/O (Input/Output) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.5 - Interrupts and Polled I/O &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.1 The SIMx86 Program - Some Simple x86 Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.2 Simple I/O-Mapped Input/Output Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.3 Memory Mapped I/O &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.4 DMA Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.5 Interrupt Driven I/O Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.6 Machine Language Programming &amp;amp; Instruction Encoding Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.6.7 Self Modifying Code Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.7 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.8 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;3.9 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER FOUR:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;MEMORY LAYOUT AND ACCESS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.1 - The 80x86 CPUs:A Programmer&#39;s View &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.1.1 - 8086 General Purpose Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.1.2 - 8086 Segment Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.1.3 - 8086 Special Purpose Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.1.4 - 80286 Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.1.5 - 80386/80486 Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.2 - 80x86 Physical Memory Organization &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.3 - Segments on the 80x86 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.4 - Normalized Addresses on the 80x86 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.5 - Segment Registers on the 80x86 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6 - The 80x86 Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.1 - 8086 Register Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2 - 8086 Memory Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.1 - The Displacement Only Addressing Mode &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.2 - The Register Indirect Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.3 - Indexed Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.4 - Based Indexed Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.5 - Based Indexed Plus Displacement Addressing Mode &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.6 - MASM Syntax for 8086 Memory Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.7 - An Easy Way to Remember the 8086 Memory Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.2.8 - Some Final Comments About 8086 Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.3 - 80386 Register Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.4 - 80386 Memory Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.4.1 - Register Indirect Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.4.2 - 80386 Indexed, Base/Indexed, and Base/Indexed/Disp Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.4.3 - 80386 Scaled Indexed Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.6.4.4 - Some Final Notes About the 80386 Memory Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.7 - The 80x86 MOV Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.8 - Some Final Comments on the MOV Instructions&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.1 The UCR Standard Library for 80x86 Assembly Language Programmers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.2 Editing Your Source Files &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.3 The SHELL.ASM File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.4 Assembling Your Code with MASM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5 Debuggers and CodeView&#39; &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.1 A Quick Look at CodeView &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.2 The Source Window &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.3 The Memory Window &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.4 The Register Window &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.5 The Command Window &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.6 The Output Menu Item &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7 The CodeView Command Window &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.1 The Radix Command (N) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.2 The Assemble Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.3 The Compare Memory Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.4 The Dump Memory Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.5 The Enter Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.6 The Fill Memory Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.7 The Move Memory Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.8 The Input Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.9 The Output Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.10 The Quit Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.11 The Register Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.7.12 The Unassemble Command &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.8 CodeView Function Keys &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.9 Some Comments on CodeView Addresses &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.5.10 A Wrap on CodeView &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.9.6 Laboratory Tasks &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.10 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.11 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;4.12 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;&lt;b&gt;Section Two:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;&lt;b&gt;Basic Assembly Language&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER FIVE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;VARIABLES AND DATA STRUCTURES&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.1 - Some Additional Instructions: LEA, LES, ADD, and MUL &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.2 - Declaring Variables in an Assembly Language Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.3 - Declaring and Accessing Scalar Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.3.1 - Declaring and using BYTE Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.3.2 - Declaring and using WORD Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.3.3 - Declaring and using DWORD Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.3.4 - Declaring and using FWORD, QWORD, and TBYTE Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.3.5 - Declaring Floating Point Variables with REAL4, REAL8, and REAL10 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.4 - Creating Your Own Type Names with TYPEDEF &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.5 - Pointer Data Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6 - Composite Data Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.1 - Arrays &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.1.1 - Declaring Arrays in Your Data Segment &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.1.2 - Accessing Elements of a Single Dimension Array &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.2 - Multidimensional Arrays&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.2.1 - Row Major Ordering &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.2.2 - Column Major Ordering&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.2.3 - Allocating Storage for Multidimensional Arrays &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.2.4 - Accessing Multidimensional Array Elements in Assembly Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.3 - Structures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.4 - Arrays of Structures and Arrays/Structures as Structure Fields &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.6.5 - Pointers to Structures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7 - Sample Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.1 - Simple Variable Declarations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.2 - Using Pointer Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.3 - Single Dimension Array Access &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.4 - Multidimensional Array Access &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.5 - Simple Structure Access &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.6 - Arrays of Structures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.7 - Structures and Arrays as Fields of Another Structure &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.7.8 - Pointers to Structures and Arrays of Structure &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.8 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.9 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.10 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;5.11 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER SIX:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE 80x86 INSTRUCTION SET&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.1 - The Processor Status Register (Flags) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.2 - Instruction Encodings &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3 - Data Movement Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3.1 - The MOV Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3.2 - The XCHG Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3.3 - The LDS, LES, LFS, LGS, and LSS Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3.4 - The LEA Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3.5 - The PUSH and POP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.3.6 - The LAHF and SAHF Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.4 - Conversions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.4.1 - The MOVZX, MOVSX, CBW, CWD, CWDE, and CDQ Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.4.2 - The BSWAP Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.4.3 - The XLAT Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5 - Arithmetic Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.1 - The Addition Instructions: ADD, ADC, INC, XADD, AAA, and DAA &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.1.1 - The ADD and ADC Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.1.2 - The INC Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.1.3 - The XADD Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.1.4 - The AAA and DAA Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.2 - The Subtraction Instructions: SUB, SBB, DEC, AAS, and DAS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.3 - The CMP Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.4 - The CMPXCHG, and CMPXCHG8B Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.5 - The NEG Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.6 - The Multiplication Instructions: MUL, IMUL, and AAM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.5.7 - The Division Instructions: DIV, IDIV, and AAD &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6 - Logical, Shift, Rotate and Bit Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.1 - The Logical Instructions: AND, OR, XOR, and NOT &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.2 - The Shift Instructions: SHL/SAL, SHR, SAR, SHLD, and SHRD &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.2.1 - SHL/SAL &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.2.2 - SAR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.2.3 - SHR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.2.4 - The SHLD and SHRD Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.3 - The Rotate Instructions: RCL, RCR, ROL, and ROR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.3.1 - RCL &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.3.2 - RCR&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.3.3 - ROL &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.3.4 - ROR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.4 - The Bit Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.4.1 - TEST &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.4.2 - The Bit Test Instructions: BT, BTS, BTR, and BTC &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.4.3 - Bit Scanning: BSF and BSR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.6.5 - The &quot;Set on Condition&quot; Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.7 - I/O Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.8 - String Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9 - Program Flow Control Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.1 - Unconditional Jumps &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.2 - The CALL and RET Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.3 - The INT, INTO, BOUND, and IRET Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.4 - The Conditional Jump Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.5 - The JCXZ/JECXZ Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.6 - The LOOP Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.7 - The LOOPE/LOOPZ Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.9.8 - The LOOPNE/LOOPNZ Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.10 - Miscellaneous Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11 - Sample Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.1 - Simple Arithmetic I &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.2 - Simple Arithmetic II &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.3 - Logical Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.4 - Shift and Rotate Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.5 - Bit Operations and SETcc Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.6 - String Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.7 - Conditional Jumps &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.8 - CALL and INT Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.9 - Conditional Jumps I &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.11.10 - Conditional Jump Instructions II &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.12 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.12.1 The IBM/L System &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.12.2 IBM/L Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.13 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.14 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;6.15 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER SEVEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE UCR STANDARD LIBRARY&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1 - An Introduction to the UCR Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.1 - Memory Management Routines: MEMINIT, MALLOC, and FREE &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.2 - The Standard Input Routines: GETC, GETS, GETSM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.3 - The Standard Output Routines: PUTC, PUTCR, PUTS, PUTH, PUTI, PRINT, and PRINTF &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.4 - Formatted Output Routines: Putisize, Putusize, Putlsize, and Putulsize &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.5 - Output Field Size Routines: Isize, Usize, and Lsize &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.6 - Conversion Routines: ATOx, and xTOA &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.7 - Routines that Test Characters for Set Membership &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.8 - Character Conversion Routines: ToUpper, ToLower &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.9 - Random Number Generation: Random, Randomize &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.10 - Constants, Macros, and other Miscellany&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.1.11 - Plus more! &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.2 - Sample Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.2.1 - Stripped SHELL.ASM File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.2.2 - Numeric I/O &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.3 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.3.1 Obtaining the UCR Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.3.2 Unpacking the Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.3.3 Using the Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.3.4 The Standard Library Documentation Files &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.4 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.5 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;7.6 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER EIGHT:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;MASM: DIRECTIVES &amp;amp; PSEUDO-OPCODES&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.1 - Assembly Language Statements &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.2 - The Location Counter &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.3 - Symbols &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.4 - Literal Constants &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.4.1 - Integer Constants &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.4.2 - String Constants &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.4.3 - Real Constants &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.4.4 - Text Constants &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.5 - Declaring Manifest Constants Using Equates &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.6 - Processor Directives &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.7 - Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8 - Segments &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.1 - Segment Names &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.2 - Segment Loading Order &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.3 - Segment Operands &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.3.1 - The ALIGN Type &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.3.2 - The COMBINE Type &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.4 - The CLASS Type &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.5 - The Read-only Operand &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.6 - The USE16, USE32, and FLAT Options &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.7 - Typical Segment Definitions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.8 - Why You Would Want to Control the Loading Order &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.9 - Segment Prefixes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.10 - Controlling Segments with the ASSUME Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.11 - Combining Segments: The GROUP Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.8.12 - Why Even Bother With Segments? &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.9 - The END Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.10 - Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.11 - Label Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.11.1 - How to Give a Symbol a Particular Type &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.11.2 - Label Values &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.11.3 - Type Conflicts &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.12 - Address Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.12.1 - Symbol Types and Addressing Modes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.12.2 - Arithmetic and Logical Operators &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.12.3 - Coercion &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.12.4 - Type Operators &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.12.5 - Operator Precedence &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.13 - Conditional Assembly &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.13.1 - IF Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.13.2 - IFE directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.13.3 - IFDEF and IFNDEF &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.13.4 - IFB, IFNB&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.13.5 - IFIDN, IFDIF, IFIDNI, and IFDIFI&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14 - Macros &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.1 - Procedural Macros &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.2 - Macros vs. 80x86 Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.3 - The LOCAL Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.4 - The EXITM Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.5 - Macro Parameter Expansion and Macro Operators &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.6 - A Sample Macro to Implement For Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.7 - Macro Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.8 - Predefined Macros, Macro Functions, and Symbols &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.9 - Macros vs. Text Equates &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.14.10 - Macros: Good and Bad News &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.15 - Repeat Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.16 - The FOR and FORC Macro Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.17 - The WHILE Macro Operation &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.18 - Macro Parameters &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19 - Controlling the Listing &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19.1 - The ECHO and %OUT Directives &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19.2 - The TITLE Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19.3 - The SUBTTL Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19.4 - The PAGE Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19.5 - The .LIST, .NOLIST, and .XLIST Directives &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.19.6 - Other Listing Directives &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.20 - Managing Large Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.20.1 - The INCLUDE Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.20.2 - The PUBLIC, EXTERN, and EXTRN Directives &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.20.3 - The EXTERNDEF Directive &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.21 - Make Files &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22 - Sample Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22.1 - EX8.MAK &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22.2 - Matrix.A &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22.3 - EX8.ASM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22.4 - GETI.ASM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22.5 - GetArray.ASM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.22.6 - XProduct.ASM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.23 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.23.1 Near vs. Far Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.23.2 Data Alignment Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.23.3 Equate Exercise &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.23.4 IFDEF Exercise &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.23.5 Make File Exercise &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.24 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.25 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;8.26 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER NINE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;ARITHMETIC AND LOGICAL OPERATIONS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.1 - Arithmetic Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.1.1 - Simple Assignments &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.1.2 - Simple Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.1.3 - Complex Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.1.4 - Commutative Operators &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.2 - Logical (Boolean) Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3 - Multiprecision Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.1 - Multiprecision Addition Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.2 - Multiprecision Subtraction Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.3 - Extended Precision Comparisons &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.4 - Extended Precision Multiplication &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.5 - Extended Precision Division &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.6 - Extended Precision NEG Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.7 - Extended Precision AND Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.8 - Extended Precision OR Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.9 - Extended Precision XOR Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.10 - Extended Precision NOT Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.11 - Extended Precision Shift Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.3.12 - Extended Precision Rotate Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.4 - Operating on Different Sized Operands &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5 - Machine and Arithmetic Idioms &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.1 - Multiplying Without MUL and IMUL &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.2 - Division Without DIV and IDIV &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.3 - Using AND to Compute Remainders &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.4 - Implementing Modulo-n Counters with AND &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.5 - Testing an Extended Precision Value for 0FFFF..FFh&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.6 - TEST Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.5.7 - Testing Signs with the XOR Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.6 - Masking Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.6.1 - Masking Operations with the AND Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.6.2 - Masking Operations with the OR Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.7 - Packing and Unpacking Data Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.8 - Tables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.8.1 - Function Computation via Table Look Up &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.8.2 - Domain Conditioning &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.8.3 - Generating Tables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.9 - Sample Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.9.1 - Converting Arithmetic Expressions to Assembly Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.9.2 - Boolean Operations Example &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.9.3 - 64-bit Integer I/O &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.9.4 - Packing and Unpacking Date Data Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.1 Debugging Programs with CodeView &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.2 Debugging Strategies &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.2.1 Locating Infinite Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.2.2 Incorrect Computations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.2.3 Illegal Instructions/Infinite Loops Part II &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.3 Debug Exercise I: Using CodeView to Find Bugs in a Calculation &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.10.4 Software Delay Loop Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.11 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.12 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;9.13 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CONTROL STRUCTURES&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.1 - Introduction to Decisions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.2 - IF..THEN..ELSE Sequences &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.3 - CASE Statements &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.4 - State Machines and Indirect Jumps &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.5 - Spaghetti Code &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.6 - Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.6.1 - While Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.6.2 - Repeat..Until Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.6.3 - LOOP..ENDLOOP Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.6.4 - FOR Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.7 - Register Usage and Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8 - Performance Improvements &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8.1 - Moving the Termination Condition to the End of a Loop &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8.2 - Executing the Loop Backwards &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8.3 - Loop Invariant Computations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8.4 - Unraveling Loops&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8.5 - Induction Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.8.6 - Other Performance Improvements &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.9 - Nested Statements &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.10 - Timing Delay Loops &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.11 - Sample Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.1 The Physics of Sound &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.2 The Fundamentals of Music &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.3 The Physics of Music &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.4 The 8253/8254 Timer Chip &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.5 Programming the Timer Chip to Produce Musical Tones &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.6 Putting it All Together &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.12.7 Amazing Grace Exercise &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.13 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.14 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;10.15 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER ELEVEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;PROCEDURES AND FUNCTIONS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.1 - Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.2 - Near and Far Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.2.1 - Forcing NEAR or FAR CALLs and Returns &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.2.2 - Nested Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.3 - Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.4 - Saving the State of the Machine &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5 - Parameters &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.1 - Pass by Value &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.2 - Pass by Reference &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.3 - Pass by Value-Returned &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.4 - Pass by Result &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.5 - Pass by Name &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.6 - Pass by Lazy-Evaluation &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.7 - Passing Parameters in Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.8 - Passing Parameters in Global Variables &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.9 - Passing Parameters on the Stack&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.10 - Passing Parameters in the Code Stream &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.5.11 - Passing Parameters via a Parameter Block &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.6 - Function Results &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.6.1 - Returning Function Results in a Register &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.6.2 - Returning Function Results on the Stack &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.6.3 - Returning Function Results in Memory Locations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.7 - Side Effects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.8 - Local Variable Storage &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.9 - Recursion &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.10 - Sample Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.11 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.11.1 Ex11_1.cpp &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.11.2 Ex11_1.asm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.11.3 EX11_1a.asm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.12 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.13 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;11.14 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Section Three:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Intermediate Level Assembly&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Language Programming&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWELVE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;PROCEDURES: ADVANCED TOPICS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1 - Lexical Nesting, Static Links, and Displays &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1.1 - Scope &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1.2 - Unit Activation, Address Binding, and Variable Lifetime &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1.3 - Static Links &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1.4 - Accessing Non-Local Variables Using Static Links &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1.5 - The Display &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.1.6 - The 80286 ENTER and LEAVE Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.2 - Passing Variables at Different Lex Levels as Parameters. &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.2.1 - Passing Parameters by Value in a Block Structured Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.2.2 - Passing Parameters by Reference, Result, and Value-Result in a Block Structured Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.2.3 - Passing Parameters by Name and Lazy-Evaluation in a Block Structured Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.3 - Passing Parameters as Parameters to Another Procedure &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.3.1 - Passing Reference Parameters to Other Procedures &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.3.2 - Passing Value-Result and Result Parameters as Parameters &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.3.3 - Passing Name Parameters to Other Procedures&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.3.4 - Passing Lazy Evaluation Parameters as Parameters &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.3.5 - Parameter Passing Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.4 - Passing Procedures as Parameters &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.5 - Iterators &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.5.1 - Implementing Iterators Using In-Line Expansion &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.5.2 - Implementing Iterators with Resume Frames &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.6 - Sample Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.6.1 - An Example of an Iterator &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.6.2 - Another Iterator Example &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.7 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.7.1 Iterator Exercise &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.7.2 The 80x86 Enter and Leave Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.7.3 Parameter Passing Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.8 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.9 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;12.10 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER THIRTEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;MS-DOS, PC-BIOS AND FILE I/O&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.1 - The IBM PC BIOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2 - An Introduction to the BIOS&#39; Services &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.1 - INT 5- Print Screen &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.2 - INT 10h - Video Services &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.3 - INT 11h - Equipment Installed &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.4 - INT 12h - Memory Available &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.5 - INT 13h - Low Level Disk Services &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.6 - INT 14h - Serial I/O &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.6.1 - AH=0: Serial Port Initialization &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.6.2 - AH=1: Transmit a Character to the Serial Port &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.6.3 - AH=2: Receive a Character from the Serial Port &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.6.4 - AH=3: Serial Port Status &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.7 - INT 15h - Miscellaneous Services &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.8 - INT 16h - Keyboard Services &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.8.1 - AH=0: Read a Key From the Keyboard &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.8.2 - AH=1: See if a Key is Available at the Keyboard &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.8.3 - AH=2: Return Keyboard Shift Key Status &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.9 - INT 17h - Printer Services &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.9.1 - AH=0: Print a Character &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.9.2 - AH=1: Initialize Printer &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.9.3 - AH=2: Return Printer Status &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.10 - INT 18h - Run BASIC &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.11 - INT 19h - Reboot Computer &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.12 - INT 1Ah - Real Time Clock &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.12.1 - AH=0: Read the Real Time Clock &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.2.12.2 - AH=1: Setting the Real Time Clock &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3 - An Introduction to MS-DOS&#39; &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.1 - MS-DOS Calling Sequence &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.2 - MS-DOS Character Oriented Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.3 - MS-DOS Drive Commands &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.4 - MS-DOS &quot;Obsolete&quot; Filing Calls &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.5 - MS-DOS Date and Time Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.6 - MS-DOS Memory Management Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.6.1 - Allocate Memory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.6.2 - Deallocate Memory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.6.3 - Modify Memory Allocation &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.6.4 - Advanced Memory Management Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.7 - MS-DOS Process Control Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.7.1 - Terminate Program Execution&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.7.2 - Terminate, but Stay Resident &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.7.3 - Execute a Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8 - MS-DOS &quot;New&quot; Filing Calls &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.1 - Open File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.2 - Create File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.3 - Close File&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.4 - Read From a File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.5 - Write to a File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.6 - Seek (Move File Pointer) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.7 - Set Disk Transfer Address (DTA) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.8 - Find First File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.9 - Find Next File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.10 - Delete File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.11 - Rename File &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.12 - Change/Get File Attributes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.13 - Get/Set File Date and Time &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.8.14 - Other DOS Calls &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.9 - File I/O Examples &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.9.1 - Example #1: A Hex Dump Utility &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.9.2 - Example #2: Upper Case Conversion &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.10 - Blocked File I/O &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.11 - The Program Segment Prefix (PSP) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.12 - Accessing Command Line Parameters &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.3.13 - ARGC and ARGV &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4 - UCR Standard Library File I/O Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.1 - Fopen &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.2 - Fcreate &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.3 - Fclose &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.4 - Fflush &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.5 - Fgetc &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.6 - Fread &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.7 - Fputc &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.8 - Fwrite &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.9 - Redirecting I/O Through the StdLib File I/O Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.4.10 - A File I/O Example &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.5 - Sample Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.6 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.7 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.8 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;13.9 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER FOURTEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;FLOATING POINT ARITHMETIC&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.1 - The Mathematics of Floating Point Arithmetic &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.2 - IEEE Floating Point Formats &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.3 - The UCR Standard Library Floating Point Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.3.1 - Load and Store Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.3.2 - Integer/Floating Point Conversion &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.3.3 - Floating Point Arithmetic &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.3.4 - Float/Text Conversion and Printff &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4 - The 80x87 Floating Point Coprocessors &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.1 - FPU Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.1.1 - The FPU Data Registers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.1.2 - The FPU Control Register &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.1.3 - The FPU Status Register &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.2 - FPU Data Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.3 - The FPU Instruction Set &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.4 - FPU Data Movement Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.4.1 - The FLD Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.4.2 - The FST and FSTP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.4.3 - The FXCH Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.5 - Conversions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.5.1 - The FILD Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.5.2 - The FIST and FISTP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.5.3 - The FBLD and FBSTP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6 - Arithmetic Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.1 - The FADD and FADDP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.2 - The FSUB, FSUBP, FSUBR, and FSUBRP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.3 - The FMUL and FMULP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.4 - The FDIV, FDIVP, FDIVR, and FDIVRP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.5 - The FSQRT Instruction&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.6 - The FSCALE Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.7 - The FPREM and FPREM1 Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.8 - The FRNDINT Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.9 - The FXTRACT Instruction&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.10 - The FABS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.6.11 - The FCHS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.7 - Comparison Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.7.1 - The FCOM, FCOMP, and FCOMPP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.7.2 - The FUCOM, FUCOMP, and FUCOMPP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.7.3 - The FTST Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.7.4 - The FXAM Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.8 - Constant Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.9 - Transcendental Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.9.1 - The F2XM1 Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.9.2 - The FSIN, FCOS, and FSINCOS Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.9.3 - The FPTAN Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.9.4 - The FPATAN Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.9.5 - The FYL2X and FYL2XP1 Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10 - Miscellaneous instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.1 - The FINIT and FNINIT Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.2 - The FWAIT Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.3 - The FLDCW and FSTCW Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.4 - The FCLEX and FNCLEX Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.5 - The FLDENV, FSTENV, and FNSTENV Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.6 - The FSAVE, FNSAVE, and FRSTOR Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.7 - The FSTSW and FNSTSW Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.8 - The FINCSTP and FDECSTP Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.9 - The FNOP Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.10.10 - The FFREE Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.4.11 - Integer Operations &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.5 - Sample Program: Additional Trigonometric Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.6 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.6.1 FPU vs StdLib Accuracy &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.7 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.8 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;14.9 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER FIFTEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;STRINGS AND CHARACTER SETS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.0 - Chapter Overview &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1 - The 80x86 String Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.1 - How the String Instructions Operate &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.2 - The REP/REPE/REPZ and REPNZ/REPNE Prefixes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.3 - The Direction Flag &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.4 - The MOVS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.5 - The CMPS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.6 - The SCAS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.7 - The STOS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.8 - The LODS Instruction &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.9 - Building Complex String Functions from LODS and STOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.1.10 - Prefixes and the String Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.2 - Character Strings &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.2.1 - Types of Strings &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.2.2 - String Assignment &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.2.3 - String Comparison &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3 - Character String Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3.1 - Substr &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3.2 - Index &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3.3 - Repeat &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3.4 - Insert &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3.5 - Delete &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.3.6 - Concatenation &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4 - String Functions in the UCR Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.1 - StrBDel, StrBDelm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.2 - Strcat, Strcatl, Strcatm, Strcatml &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.3 - Strchr &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.4 - Strcmp, Strcmpl, Stricmp, Stricmpl&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.5 - Strcpy, Strcpyl, Strdup, Strdupl&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.6 - Strdel, Strdelm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.7 - Strins, Strinsl, Strinsm, Strinsml &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.8 - Strlen &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.9 - Strlwr, Strlwrm, Strupr, Struprm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.10 - Strrev, Strrevm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.11 - Strset, Strsetm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.12 - Strspan, Strspanl, Strcspan, Strcspanl &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.13 - Strstr, Strstrl &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.14 - Strtrim, Strtrimm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.4.15 - Other String Routines in the UCR Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.5 - The Character Set Routines in the UCR Standard Library &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.6 - Using the String Instructions on Other Data Types &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.6.1 - Multi-precision Integer Strings &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.6.2 - Dealing with Whole Arrays and Records &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.7 - Sample Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.7.1 - Find.asm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.7.2 - StrDemo.asm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.7.3 - Fcmp.asm&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.8 Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.8.1 MOVS Performance Exercise #1 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.8.2 MOVS Performance Exercise #2 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.8.3 Memory Performance Exercise &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.8.4 The Performance of Length-Prefixed vs. Zero-Terminated Strings &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.9 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.10 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;15.11 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER SIXTEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;PATTERN MATCHING&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1 - An Introduction to Formal Language (Automata) Theory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.1 - Machines vs. Languages &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2 - Regular Languages &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2.1 - Regular Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2.2 - Nondeterministic Finite State Automata (NFAs) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2.3 - Converting Regular Expressions to NFAs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2.4 - Converting an NFA to Assembly Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2.5 - Deterministic Finite State Automata (DFAs) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.2.6 - Converting a DFA to Assembly Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.3 - Context Free Languages &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.4 - Eliminating Left Recursion and Left Factoring CFGs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.5 - Converting REs to CFGs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.6 - Converting CFGs to Assembly Language &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.7 - Some Final Comments on CFGs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.1.8 - Beyond Context Free Languages &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.2 - The UCR Standard Library Pattern Matching Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3 - The Standard Library Pattern Matching Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.1 - Spancset &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.2 - Brkcset &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.3 - Anycset &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.4 - Notanycset &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.5 - MatchStr &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.6 - MatchiStr &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.7 - MatchToStr &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.8 - MatchChar &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.9 - MatchToChar &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.10 - MatchChars&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.11 - MatchToPat &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.12 - EOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.13 - ARB &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.14 - ARBNUM&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.15 - Skip &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.16 - Pos &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.17 - RPos &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.18 - GotoPos &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.19 - RGotoPos &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.3.20 - SL_Match2 &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.4 - Designing Your Own Pattern Matching Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.5 - Extracting Substrings from Matched Patterns &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.6 - Semantic Rules and Actions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.7 - Constructing Patterns for the MATCH Routine &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.8 - Some Sample Pattern Matching Applications &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.8.1 - Converting Written Numbers to Integers &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.8.2 - Processing Dates &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.8.3 - Evaluating Arithmetic Expressions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.8.4 - A Tiny Assembler &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.8.5 - The &quot;MADVENTURE&quot; Game &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.9 - Laboratory Exercises &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.9.1 - Checking for Stack Overflow (Infinite Loops) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.9.2 - Printing Diagnostic Messages from a Pattern &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.10 Programming Projects &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.11 Summary &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;16.12 Questions&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Section Four:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Advanced Assembly&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Language Programming&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER SEVENTEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;INTERRUPTS, TRAPS AND EXEPTIONS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.1 - 80x86 Interrupt Structure and Interrupt Service Routines (ISRs) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.2 - Traps &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3 - Exceptions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.1 - Divide Error Exception (INT 0) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.2 - Single Step (Trace) Exception (INT 1) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.3 - Breakpoint Exception (INT 3) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.4 - Overflow Exception (INT 4/INTO) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.5 - Bounds Exception (INT 5/BOUND) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.6 - Invalid Opcode Exception (INT 6) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.3.7 - Coprocessor Not Available (INT 7) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4 - Hardware Interrupts &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.1 - The 8259A Programmable Interrupt Controller (PIC) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.2 - The Timer Interrupt (INT 8) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.3 - The Keyboard Interrupt (INT 9) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.4 - The Serial Port Interrupts (INT 0Bh and INT 0Ch)&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.5 - The Parallel Port Interrupts (INT 0Dh and INT 0Fh) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.6 - The Diskette and Hard Drive Interrupts (INT 0Eh and INT 76h)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.7 - The Real-Time Clock Interrupt (INT 70h) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.8 - The FPU Interrupt (INT 75h) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.9 - Nonmaskable Interrupts (INT 2) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.4.10 - Other Interrupts &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.5 - Chaining Interrupt Service Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.6 - Reentrancy Problems &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.7 - The Efficiency of an Interrupt Driven System &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.7.1 - Interrupt Driven I/O vs. Polling &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.7.2 - Interrupt Service Time &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.7.3 - Interrupt Latency &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.7.4 - Prioritized Interrupts &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.8 - Debugging ISRs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;17.9 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER EIGHTEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;RESIDENT PROGRAMS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.1 - DOS Memory Usage and TSRs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.2 - Active vs. Passive TSRs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.3 - Reentrancy &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.3.1 - Reentrancy Problems with DOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.3.2 - Reentrancy Problems with BIOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.3.3 - Reentrancy Problems with Other Code &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.4 - The Multiplex Interrupt (INT 2Fh)&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.5 - Installing a TSR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.6 - Removing a TSR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.7 - Other DOS Related Issues &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.8 - A Keyboard Monitor TSR &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.9 - Semiresident Programs &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;18.10 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER NINETEEN:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;PROCESSES, COROUTINES AND CONCURRENCY&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1 - DOS Processes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.1 - Child Processes in DOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.1.1 - Load and Execute &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.1.2 - Load Program &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.1.3 - Loading Overlays &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.1.4 - Terminating a Process &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.1.5 - Obtaining the Child Process Return Code &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.2 - Exception Handling in DOS: The Break Handler &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.3 - Exception Handling in DOS: The Critical Error Handler &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.4 - Exception Handling in DOS: Traps &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.1.5 - Redirection of I/O for Child Processes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.2 - Shared Memory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.2.1 - Static Shared Memory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.2.2 - Dynamic Shared Memory &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.3 - Coroutines&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.3.1 - AMAZE.ASM &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.3.2 - 32-bit Coroutines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.4 - Multitasking &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.4.1 - Lightweight and HeavyWeight Processes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.4.2 - The UCR Standard Library Processes Package &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.4.3 - Problems with Multitasking &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.4.4 - A Sample Program with Threads &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.5 - Synchronization &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.5.1 - Atomic Operations, Test &amp;amp; Set, and Busy-Waiting &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.5.2 - Semaphores &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.5.3 - The UCR Standard Library Semaphore Support &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.5.4 - Using Semaphores to Protect Critical Regions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.5.5 - Using Semaphores for Barrier Synchronization &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.6 - Deadlock &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;19.7 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Section Five:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;The PC&#39;S I/O PORTS&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWENTY:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE PC KEYBOARD&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.1 - Keyboard Basics &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.2 - The Keyboard Hardware Interface &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.3 - The Keyboard DOS Interface &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.4 - The Keyboard BIOS Interface &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.5 - The Keyboard Interrupt Service Routine&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.6 - Patching into the INT 9 Interrupt Service Routine&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.7 - Simulating Keystrokes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.7.1 - Stuffing Characters in the Type Ahead Buffer &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.7.2 - Using the 80x86 Trace Flag to Simulate IN AL, 60H Instructions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.7.3 - Using the 8042 Microcontroller to Simulate Keystrokes &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;20.8 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWENTY ONE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE PC PARALLEL PORTS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.1 - Basic Parallel Port Information &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.2 - The Parallel Port Hardware &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.3 - Controlling a Printer Through the Parallel Port &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.3.1 - Printing via DOS&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.3.2 - Printing via BIOS &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.3.3 - An INT 17h Interrupt Service Routine &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.4 - Inter-Computer Communications on the Parallel Port &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;21.5 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWENTY TWO:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE PC SERIAL PORTS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1 - The 8250 Serial Communications Chip &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.1 - The Data Register (Transmit/Receive Register) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.2 - The Interrupt Enable Register (IER) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.3 - The Baud Rate Divisor &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.4 - The Interrupt Identification Register (IIR) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.5 - The Line Control Register &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.6 - The Modem Control Register&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.7 - The Line Status Register (LSR) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.8 - The Modem Status Register (MSR) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.1.9 - The Auxiliary Input Register &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.2 - The UCR Standard Library Serial Communications Support Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.3 - Programming the 8250 (Examples from the Standard Library) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;22.4 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWENTY THREE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE PC VIDEO DISPLAY&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;23.1 - Memory Mapped Video &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;23.2 - The Video Attribute Byte &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;23.3 - Programming the Text Display &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;23.4 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWENTY FOUR:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;THE PC GAME ADAPTER&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.1 - Typical Game Devices &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.2 - The Game Adapter Hardware &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.3 - Using BIOS&#39; Game I/O Functions &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.4 - Writing Your Own Game I/O Routines &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5 - The Standard Game Device Interface (SGDI) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.1 - Application Programmer&#39;s Interface (API) &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.2 - Read4Sw &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.3 - Read4Pots: &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.4 - ReadPot &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.5 - Read4: &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.6 - CalibratePot&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.7 - TestPotCalibration &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.8 - ReadRaw &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.9 - ReadSwitch &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.10 - Read16Sw &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.11 - Remove &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.12 - TestPresence &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.5.13 - An SGDI Driver for the Standard Game Adapter Card &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.6 - An SGDI Driver for the CH Products&#39; Flight Stick Pro&#39; &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.7 - Patching Existing Games &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;24.8 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Section Six:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF0000;&quot;&gt;Optimization&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;CHAPTER TWENTY FIVE:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;OPTIMIZING YOUR PROGRAMS&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;25.1 - When to Optimize, When Not to Optimize &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;25.2 - How Do You Find the Slow Code in Your Programs? &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;25.3 - Is Optimization Necessary?&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space:pre&quot;&gt; &lt;/span&gt;25.4 - The Three Types of Optimization &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;25.5 - Improving the Implementation of an Algorithm &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;25.6 Summary&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#009900;&quot;&gt;&lt;a href=&quot;http://kewlshare.com/dl/ba459265fecf/Assembly_Reference_by_Invisible.rar.html&quot;&gt;Download Here&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FF9900;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&quot;Invisible Digital&quot;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/3363370076724221187/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/ebook-assembly-reference-for.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3363370076724221187'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3363370076724221187'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/ebook-assembly-reference-for.html' title='&quot;Ebook&quot; Assembly Reference for Programming by Invisible'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-1844449694087217931</id><published>2009-08-03T17:59:00.000-07:00</published><updated>2009-08-03T18:10:06.360-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Assembler"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Ollydbg"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="RE"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><title type='text'>&quot;Video Tutorial&quot; Builld CrackMe + Serial Sniffing with OllyDbg (Include Source)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;This Tutorial is Newbie Tutorial&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This Tutorial, How to Build the CrackMe &amp;amp; Serial Sniffing the Application With OllyDbg&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Usefull &amp;amp; happy Learning With Invisible&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/ea052fdca110/Source___Video_Tutorial_Crack_Saya.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/1844449694087217931/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/video-tutorial-builld-crackme-serial.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1844449694087217931'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1844449694087217931'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/video-tutorial-builld-crackme-serial.html' title='&quot;Video Tutorial&quot; Builld CrackMe + Serial Sniffing with OllyDbg (Include Source)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-1954329003394988300</id><published>2009-08-01T03:48:00.000-07:00</published><updated>2009-08-01T03:57:50.094-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Assembler"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Ollydbg"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Video Tutorial (Inject Exe With OllyDbg)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;This Video Tutorial for All in the World :D.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt; on tutorial is Small Trick for Inject Exe with Ollydbg.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Let&#39;s Watch &amp;amp; Learn Now.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/8589057d23d1/Tutorial__Inject_Exe_.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(204, 0, 0);&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/1954329003394988300/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/video-tutorial-inject-exe-with-ollydbg.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1954329003394988300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1954329003394988300'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/08/video-tutorial-inject-exe-with-ollydbg.html' title='Video Tutorial (Inject Exe With OllyDbg)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-5630530282222687133</id><published>2009-06-28T18:39:00.000-07:00</published><updated>2009-06-28T18:51:01.718-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Delphi"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="MD5"/><category scheme="http://www.blogger.com/atom/ns#" term="My Program"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Invisible Multi MD5 Online Cracker (Include Source Code)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;Invisible Multi md5 Crack is Tool for hasher for md5 Algorithm in Online Database. Build in Delphi 2009&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYSgmCZgoQkeOk23TBq1A0e4q2VAX7mHRkO65lYUNzsvDWXju2BrY0aQTq2q3ykEjO2QcXwTHc8WZy17HgxK3-bgJZvUOFJDbVE_zfdyze0k0ykSWyJ8oJ1ICzjPZbT3RtkCcHcYCzKNf1/s1600-h/invisiblemd5.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 177px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYSgmCZgoQkeOk23TBq1A0e4q2VAX7mHRkO65lYUNzsvDWXju2BrY0aQTq2q3ykEjO2QcXwTHc8WZy17HgxK3-bgJZvUOFJDbVE_zfdyze0k0ykSWyJ8oJ1ICzjPZbT3RtkCcHcYCzKNf1/s320/invisiblemd5.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5352559503593767490&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Supported Online Database :&lt;br /&gt;&lt;br /&gt;-&lt;a href=&quot;http://milw0rm.com/&quot;&gt;milw0rm.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://gdataonline.com/&quot;&gt;gdataonline.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://hashkiller.com/&quot;&gt;hashkiller.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://csthis.com/&quot;&gt;csthis.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://crysm.net/&quot;&gt;crysm.net&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://rednoize.com/&quot;&gt;rednoize.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://nd5decrypter.com/&quot;&gt;nd5decrypter.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://hashreverse.com/&quot;&gt;hashreverse.com&lt;/a&gt;&lt;br /&gt;-&lt;a href=&quot;http://cryptobitch.de/&quot;&gt;cryptobitch.de&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;If U Like This Tool, Me Waiting Ur Comment.&lt;br /&gt;&lt;br /&gt;and&lt;br /&gt;&lt;br /&gt;If U Want This Source Follow my &lt;a href=&quot;http://google.com/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Google Followers&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;Enjoy With Me.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 153, 0); font-style: italic; font-weight: bold;&quot;&gt;Regards,&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/410c41502c93/Invisible-Md5_Crack.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;Invisible-Digital&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/5630530282222687133/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/invisible-multi-md5-crack-is-tool-for.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/5630530282222687133'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/5630530282222687133'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/invisible-multi-md5-crack-is-tool-for.html' title='Invisible Multi MD5 Online Cracker (Include Source Code)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYSgmCZgoQkeOk23TBq1A0e4q2VAX7mHRkO65lYUNzsvDWXju2BrY0aQTq2q3ykEjO2QcXwTHc8WZy17HgxK3-bgJZvUOFJDbVE_zfdyze0k0ykSWyJ8oJ1ICzjPZbT3RtkCcHcYCzKNf1/s72-c/invisiblemd5.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-8696677694140555827</id><published>2009-06-27T18:19:00.000-07:00</published><updated>2009-06-27T18:27:39.903-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="My Program"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><title type='text'>Adder Bytes by Invisible-Digital</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;Adder bytes is the application that works for Increasing the size of executable files (*. EXE) applications, especially Windows.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip2Ak0O0BHxTq0naBjhPWMwcwgqfdODeae11_Ji7Qb9M8iIqqd3BrDszMYLs5x3eUbq9SPLbiGZ8yPKjMZ4s4wYKLkD71SYDXzg3tyln8rTfXNsv5JGsz74pfrimWKOTIC_v7zOLQNTVoN/s1600-h/Penambah+ukuran.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 307px; height: 193px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip2Ak0O0BHxTq0naBjhPWMwcwgqfdODeae11_Ji7Qb9M8iIqqd3BrDszMYLs5x3eUbq9SPLbiGZ8yPKjMZ4s4wYKLkD71SYDXzg3tyln8rTfXNsv5JGsz74pfrimWKOTIC_v7zOLQNTVoN/s320/Penambah+ukuran.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5352183853244166274&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Congratulations Using&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;Enjoy With Me&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/8cd8e31c3ce5/Penambah_Size.rar.html&quot;&gt;&lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/8696677694140555827/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/adder-bytes-by-invisible-digital.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8696677694140555827'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8696677694140555827'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/adder-bytes-by-invisible-digital.html' title='Adder Bytes by Invisible-Digital'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip2Ak0O0BHxTq0naBjhPWMwcwgqfdODeae11_Ji7Qb9M8iIqqd3BrDszMYLs5x3eUbq9SPLbiGZ8yPKjMZ4s4wYKLkD71SYDXzg3tyln8rTfXNsv5JGsz74pfrimWKOTIC_v7zOLQNTVoN/s72-c/Penambah+ukuran.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-3162600436723866921</id><published>2009-06-27T17:20:00.000-07:00</published><updated>2009-06-27T17:55:59.834-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FreeBSD"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Video Tutorial Installing FreeBSD by Invisible Team</title><content type='html'>&lt;div style=&quot;text-align: center;&quot; id=&quot;result_box&quot; dir=&quot;ltr&quot;&gt;&lt;a href=&quot;http://www.freebsd.org/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FreeBSD&lt;/span&gt;&lt;/a&gt; is an operating system that functions to optimize the use of the PC platform. &lt;a href=&quot;http://www.freebsd.org/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FreeBSD&lt;/span&gt;&lt;/a&gt; provides ease of installation and support of the broad PC hardware. &lt;a href=&quot;http://www.freebsd.org/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FreeBSD&lt;/span&gt;&lt;/a&gt; supports the i386 and alpha architectures, and development in the &lt;a href=&quot;http://www.freebsd.org/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FreeBSD&lt;/span&gt;&lt;/a&gt; platform has also been made. &lt;a href=&quot;http://www.freebsd.org/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FreeBSD&lt;/span&gt;&lt;/a&gt; is also used on servers that have the traffic and performance high enough to WWW and FTP service such as &lt;a href=&quot;http://yahoo.com/&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;www.yahoo.com&lt;/span&gt;&lt;/a&gt; and &lt;span style=&quot;font-style: italic;&quot;&gt;ftp.cdrom.com&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;With the Video Tutorials that we know more about more in &lt;a href=&quot;http://www.freebsd.org/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;BSD&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Happy Learning and Hope useful&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/d20da441519c/demo_pc-bsd.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;&quot;Invisible Team&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/3162600436723866921/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-installing-freebsd-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3162600436723866921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3162600436723866921'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-installing-freebsd-by.html' title='Video Tutorial Installing FreeBSD by Invisible Team'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-7329191205991817069</id><published>2009-06-27T02:53:00.000-07:00</published><updated>2009-06-27T03:02:58.538-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Database"/><category scheme="http://www.blogger.com/atom/ns#" term="DB2"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Oracle"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><category scheme="http://www.blogger.com/atom/ns#" term="Sybase"/><title type='text'>Guidance of Database Penetration (Ebook &amp; Software) for Invisible Counters</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;Database Penetrating is a guidance that specific to you that wish learn database penetration, for example :&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Oracle, SQL Server, MySQL, Sybase and Adaptive Server Enterprise, and DB2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;discussion list that exist in Database Penetrating :&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;(General, Function, Information, System Tables, View,  &amp;amp; Stored Procedures, Dangerous Stored Procedures).&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Enjoy With Me&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/8bbf286989d8/Sql_Injector.rar.html&quot;&gt;&lt;span style=&quot;color: rgb(255, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/7329191205991817069/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/guidance-of-database-penetration-ebook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/7329191205991817069'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/7329191205991817069'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/guidance-of-database-penetration-ebook.html' title='Guidance of Database Penetration (Ebook &amp; Software) for Invisible Counters'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-8641096632827260560</id><published>2009-06-25T19:10:00.000-07:00</published><updated>2009-06-25T19:22:55.478-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><title type='text'>DOS Attack by Invisible Flooder (Source VB 6)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&quot;DoS&quot; is attack type to a computer or server in internet network by finish source (resource) owned by by computer referred till computer referred can not run its function truly until indirectly prevent other user for getting the access service from computer that attacked referred.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC4mNQUt4C5PmB9bIUHFgbHKUKSb5d6ujXZcLyjKivmZR_bfZgfi8RIOPEx4_KpJf7SD0V92zF5Kd5I8EUSj00lrALoN58tTzrsVwYdXbg2sXmfzTAS3InqKwX5KE_RhLUqNmFF1KGWaE3/s1600-h/IF.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 212px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC4mNQUt4C5PmB9bIUHFgbHKUKSb5d6ujXZcLyjKivmZR_bfZgfi8RIOPEx4_KpJf7SD0V92zF5Kd5I8EUSj00lrALoN58tTzrsVwYdXbg2sXmfzTAS3InqKwX5KE_RhLUqNmFF1KGWaE3/s320/IF.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5351455763697581346&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;In an attack Denial of Service, the attacker will try to prevent access a user to system or network by using some ways, namely as follows:&lt;br /&gt;&lt;br /&gt;* Inundated network traffic with many data until network traffic incoming from user that enlisted becoming not accessible into network system. This Technique is conceived of &quot;traffic flooding&quot;.&lt;br /&gt;* Inundate network with many request to a network service that disedakan by a host until incoming request from user enlisted can not be served by service referred. This Technique is conceived of &quot;request flooding&quot;.&lt;br /&gt;* Bother communication between a its tuan rumah (host) and client that enlisted by using much ways, entered by alter information of system configuraton or even physical mutilation to component and server.&lt;br /&gt;&lt;br /&gt;this tool and source code can become reference in making of DOS tool.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/7b4f87da92c5/Invisible_Flooder.rar.html&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold; color: rgb(255, 204, 102);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/8641096632827260560/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/dos-attack-by-invisible-flooder-source.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8641096632827260560'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8641096632827260560'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/dos-attack-by-invisible-flooder-source.html' title='DOS Attack by Invisible Flooder (Source VB 6)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC4mNQUt4C5PmB9bIUHFgbHKUKSb5d6ujXZcLyjKivmZR_bfZgfi8RIOPEx4_KpJf7SD0V92zF5Kd5I8EUSj00lrALoN58tTzrsVwYdXbg2sXmfzTAS3InqKwX5KE_RhLUqNmFF1KGWaE3/s72-c/IF.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-8257029714403009722</id><published>2009-06-21T13:58:00.000-07:00</published><updated>2009-06-21T14:05:14.404-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASP"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><title type='text'>Video Tutorial ASP Penetration by Invisible Team</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;This is a Video Tutorial from &quot;IsTeam&quot; (Invisible Security Team) &quot;&lt;span style=&quot;font-weight: bold;&quot;&gt;Just Education Only&lt;/span&gt;&quot;&lt;br /&gt;&lt;br /&gt;This tutorial discusses about ASP penetration fo MSSQL Server 2005 &amp;amp; 2008.&lt;br /&gt;&lt;br /&gt;Enjoy With Me&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/273da5ebc2d9/Hari_Ketiga_ISTEAM.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&quot;Invisible Security Team&quot;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/8257029714403009722/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-asp-penetration-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8257029714403009722'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8257029714403009722'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-asp-penetration-by.html' title='Video Tutorial ASP Penetration by Invisible Team'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-1843777015470087235</id><published>2009-06-15T23:45:00.000-07:00</published><updated>2009-06-15T23:54:49.176-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><title type='text'>Internet Explorer 7 &amp; 8 Password Recovery</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;IE Pass Recovery is Small App for Recovery your IE Pass&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNxCQwINV20ufJtn_nMGh7LxfTJQty2gYu9fsRP2t7_-cDPn-ryZkCWFpORnK1Kj_nOX_fqKLgplQK_mbnp56bfulVhJfK64rbjVFzPDiYAZ2_kfWZI0hG2G8A1ba0HXJHFMt8D5VXRkJd/s1600-h/ierec.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 279px; height: 262px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNxCQwINV20ufJtn_nMGh7LxfTJQty2gYu9fsRP2t7_-cDPn-ryZkCWFpORnK1Kj_nOX_fqKLgplQK_mbnp56bfulVhJfK64rbjVFzPDiYAZ2_kfWZI0hG2G8A1ba0HXJHFMt8D5VXRkJd/s320/ierec.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5347814511655332738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;this application is provided with source code&lt;br /&gt;&lt;br /&gt;Enjoy With Me&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/f459f8e721cf/Internet_Explorer_Passwords_Recovery.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download 1 &lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5207940/InternetExplorerPasswordsRecovery.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download 2&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/1843777015470087235/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/internet-explorer-7-8-password-recovery.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1843777015470087235'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1843777015470087235'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/internet-explorer-7-8-password-recovery.html' title='Internet Explorer 7 &amp; 8 Password Recovery'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNxCQwINV20ufJtn_nMGh7LxfTJQty2gYu9fsRP2t7_-cDPn-ryZkCWFpORnK1Kj_nOX_fqKLgplQK_mbnp56bfulVhJfK64rbjVFzPDiYAZ2_kfWZI0hG2G8A1ba0HXJHFMt8D5VXRkJd/s72-c/ierec.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-868507151661308449</id><published>2009-06-14T02:27:00.000-07:00</published><updated>2009-06-14T02:36:10.677-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><title type='text'>Video Tutorial SQL Penetration by Invisible Team</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;This is a Video Tutorial from &quot;IsTeam&quot; (Invisible Security Team) Just Education Only&lt;br /&gt;&lt;br /&gt;This tutorial discusses about SQL penetration.&lt;br /&gt;&lt;br /&gt;Enjoy With Me&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://kewlshare.com/dl/0344599ff808/Hari_Kedua_ISTEAM.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible Security Team&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/868507151661308449/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-sql-penetration-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/868507151661308449'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/868507151661308449'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-sql-penetration-by.html' title='Video Tutorial SQL Penetration by Invisible Team'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-6368405873123546632</id><published>2009-06-11T00:22:00.000-07:00</published><updated>2009-06-11T00:41:50.069-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="RE"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Video Tutorial Patching &amp; Fishing by Invisible Team</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;This is a Video Tutorial from &quot;IsTeam&quot; (Invisible Security Team) Just Education Only&lt;br /&gt;&lt;br /&gt;in the video in this tutorial there are 2 Tutorial, which is &quot;Serial Fishing&quot; &amp;amp; &quot;Patching&quot;&lt;br /&gt;&lt;br /&gt;Patching is Changing the program&#39;s algorithms are created by programmers, or often called &quot;Pathcing&quot; while the &quot;Serial Fishing&quot; is the process in a fishing Serial Method Reverse Enginnering.&lt;br /&gt;&lt;br /&gt;Happy Learning.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5140889/HariPertamaISTEAM.rar.html&quot;&gt;Download Here this Tutorial&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Regards.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Hanjian &amp;amp; IsTeam (Invisible Security Team)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/6368405873123546632/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-patching-fishing-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/6368405873123546632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/6368405873123546632'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/video-tutorial-patching-fishing-by.html' title='Video Tutorial Patching &amp; Fishing by Invisible Team'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-5662865552330292068</id><published>2009-06-07T03:16:00.000-07:00</published><updated>2009-06-07T03:29:51.562-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".NET"/><category scheme="http://www.blogger.com/atom/ns#" term="C#"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>(Basic C#) Absent Application with .NET + Source Code</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This Example Absent Application&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhpgRvuCVPAiy7fJ2WvP_fJwZPVWglUQnMHbghQw0ibeC1KlSOWkYTNSWUx1I6qUoLbRjojyaPf4L-TXmvPX3LGsu_WVZ6nGQ57ckLN1y89oKCp1rTSGrV46RlwmsKbBEK9f85TOVWtTX/s1600-h/absensi.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 316px; height: 311px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhpgRvuCVPAiy7fJ2WvP_fJwZPVWglUQnMHbghQw0ibeC1KlSOWkYTNSWUx1I6qUoLbRjojyaPf4L-TXmvPX3LGsu_WVZ6nGQ57ckLN1y89oKCp1rTSGrV46RlwmsKbBEK9f85TOVWtTX/s320/absensi.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5344529612176929970&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Enjoy With Me &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;a href=&quot;http://www.ziddu.com/download/5083767/Absensi.rar.html&quot;&gt;Download Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 102, 0);&quot;&gt;Password : &lt;a href=&quot;http://invisible-digital.blogspot.com&quot;&gt;http://invisible-digital.blogspot.com&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Invisible-Digital&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/5662865552330292068/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/basic-c-absent-application-with-net.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/5662865552330292068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/5662865552330292068'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/basic-c-absent-application-with-net.html' title='(Basic C#) Absent Application with .NET + Source Code'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhpgRvuCVPAiy7fJ2WvP_fJwZPVWglUQnMHbghQw0ibeC1KlSOWkYTNSWUx1I6qUoLbRjojyaPf4L-TXmvPX3LGsu_WVZ6nGQ57ckLN1y89oKCp1rTSGrV46RlwmsKbBEK9f85TOVWtTX/s72-c/absensi.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-7240662631797311605</id><published>2009-06-03T01:38:00.000-07:00</published><updated>2009-06-03T01:51:06.557-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><title type='text'>Volume Control for Win32 by Invisible Build in VB 6</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This is Example for Setting Volume Control in Windows.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg82hUVqFnJmxdJ0iGwrt_Jz7gxsWMHCU-EGLBMvUONz6mJNLfnfFd1au9RiHiRoV3IT1GX4B1avTlOiTwvyZrejDi-UZmJWI42L5HVSl-UvjYZWJzt5IR0cJXIhaSP52pYkSqVGTcnd1_8/s1600-h/volcom.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 140px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg82hUVqFnJmxdJ0iGwrt_Jz7gxsWMHCU-EGLBMvUONz6mJNLfnfFd1au9RiHiRoV3IT1GX4B1avTlOiTwvyZrejDi-UZmJWI42L5HVSl-UvjYZWJzt5IR0cJXIhaSP52pYkSqVGTcnd1_8/s320/volcom.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5343019606345007714&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/5022965/VolumeCOntrol.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 153, 0);&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;Invisible-Digital&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/7240662631797311605/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/volume-control-for-win32-by-invisible.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/7240662631797311605'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/7240662631797311605'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/volume-control-for-win32-by-invisible.html' title='Volume Control for Win32 by Invisible Build in VB 6'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg82hUVqFnJmxdJ0iGwrt_Jz7gxsWMHCU-EGLBMvUONz6mJNLfnfFd1au9RiHiRoV3IT1GX4B1avTlOiTwvyZrejDi-UZmJWI42L5HVSl-UvjYZWJzt5IR0cJXIhaSP52pYkSqVGTcnd1_8/s72-c/volcom.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-2731815777037202717</id><published>2009-06-01T08:42:00.000-07:00</published><updated>2009-06-01T08:56:17.868-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term=".NET"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="My Program"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Generate &amp; Validate CD-KEY for Software (Example &amp; Source)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;This Application &amp;amp; Source  &lt;span style=&quot;font-weight: bold; color: rgb(255, 153, 0);&quot;&gt;&quot;Open Source&quot;.&lt;/span&gt; for U&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJFE7-5u2g4MeYwkPPAjfz3xuBxLwT1CHmIDCu_dk3LAbEBi7A1VoEK9p9-j54xDC4KQuyTyenR41gOShk0j_K8lYvbpGv73FnMoRaP5prAMspvWlbrTW-4MvMqVdITrTcAD6P3OP9i_R_/s1600-h/valid2.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 242px; height: 281px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJFE7-5u2g4MeYwkPPAjfz3xuBxLwT1CHmIDCu_dk3LAbEBi7A1VoEK9p9-j54xDC4KQuyTyenR41gOShk0j_K8lYvbpGv73FnMoRaP5prAMspvWlbrTW-4MvMqVdITrTcAD6P3OP9i_R_/s320/valid2.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5342387989654986994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIXXqUQm0-s33vbH0ienmgoToA9euiG6OeUH9jqeluMsHJSE7f6tTDKfE_vggNkXRUuoyiLGWPJu6Q7AsD_VF1-UyUQp0Lva5r647oXePxnWs_3uDZTESm2eyEMX8oDJOK0-EkcPLQvjHh/s1600-h/valid1.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 156px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIXXqUQm0-s33vbH0ienmgoToA9euiG6OeUH9jqeluMsHJSE7f6tTDKfE_vggNkXRUuoyiLGWPJu6Q7AsD_VF1-UyUQp0Lva5r647oXePxnWs_3uDZTESm2eyEMX8oDJOK0-EkcPLQvjHh/s320/valid1.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5342387167706999250&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;The purpose of this Posting is to provide examples on how to implement a CD-Key system into your software.&lt;br /&gt;&lt;br /&gt;If U Like My Posting, Enjoy With &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Invisible-Digital&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/4996194/Source1.rar.html&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;Download Source&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/4996195/Aplikasi.rar.html&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;Download Example&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Regards, Invisible-Digital&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/2731815777037202717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/generate-validate-cd-key-for-software.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/2731815777037202717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/2731815777037202717'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/06/generate-validate-cd-key-for-software.html' title='Generate &amp; Validate CD-KEY for Software (Example &amp; Source)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJFE7-5u2g4MeYwkPPAjfz3xuBxLwT1CHmIDCu_dk3LAbEBi7A1VoEK9p9-j54xDC4KQuyTyenR41gOShk0j_K8lYvbpGv73FnMoRaP5prAMspvWlbrTW-4MvMqVdITrTcAD6P3OP9i_R_/s72-c/valid2.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-3743882112381643674</id><published>2009-03-10T02:46:00.000-07:00</published><updated>2009-03-10T02:54:07.021-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Visual Basic"/><title type='text'>Simple Icon Changer &amp; Validate PE with VB 6+ Source Code</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This is a simple Icon Changer &amp;amp; Validate PE by Invisible-Digital.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcFHcz4JDC04OamxQEOpbH9puQO54EpPRNnvxnP5fy0bTrEaRMPeXd1TQrn0J9OY8ST2fBlDBrGh96UBtMPY3iKfHR09eIpxY0ThRJrDim_7K1MCKrssuKw6wKCEcWu_vCgzdQzs8sLlRI/s1600-h/icon.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 146px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcFHcz4JDC04OamxQEOpbH9puQO54EpPRNnvxnP5fy0bTrEaRMPeXd1TQrn0J9OY8ST2fBlDBrGh96UBtMPY3iKfHR09eIpxY0ThRJrDim_7K1MCKrssuKw6wKCEcWu_vCgzdQzs8sLlRI/s320/icon.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5311494670973100114&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;This App for change your icon in Executable.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Enjoy With Me.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/207476441/change_icon.rar.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download Here.&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/3743882112381643674/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/03/simple-icon-changer-validate-pe-with-vb.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3743882112381643674'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3743882112381643674'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/03/simple-icon-changer-validate-pe-with-vb.html' title='Simple Icon Changer &amp; Validate PE with VB 6+ Source Code'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcFHcz4JDC04OamxQEOpbH9puQO54EpPRNnvxnP5fy0bTrEaRMPeXd1TQrn0J9OY8ST2fBlDBrGh96UBtMPY3iKfHR09eIpxY0ThRJrDim_7K1MCKrssuKw6wKCEcWu_vCgzdQzs8sLlRI/s72-c/icon.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-3245400818978763940</id><published>2009-03-01T13:14:00.000-08:00</published><updated>2009-03-01T13:32:10.203-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="C#"/><category scheme="http://www.blogger.com/atom/ns#" term="My Program"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>&quot;My Program&quot; Invisible File Locker for All &amp; Secure Crypting</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Invisible File Locker is File Locker (Image, Data, App) All Round Locker.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhXqcp-A4yz9YyFfKHrR_f2TdrE_-2T0G8qJWB9PE82xTWIf5qes4eetLvLoD9nk3taaw4yhlrLEqrsDgbd-hobqLVFO8fMXqEd5WZfAEvfR0Ib4ko8LdUneIUWKSpBtIa7mHVIsLZ76Ob/s1600-h/skunsut.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 172px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhXqcp-A4yz9YyFfKHrR_f2TdrE_-2T0G8qJWB9PE82xTWIf5qes4eetLvLoD9nk3taaw4yhlrLEqrsDgbd-hobqLVFO8fMXqEd5WZfAEvfR0Ib4ko8LdUneIUWKSpBtIa7mHVIsLZ76Ob/s320/skunsut.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5308335051674787042&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjicTm0vAak_YQq_p2m8ip0rKdskH8pnHNLrKTZxsKULVOsGItHYsQLDxqSxsDn08r9n5Y-J8umb06WIPSxJY_A6BvPLMFVKNAiQkg3RB7mYDDuF7NiLvNwfaVu_K4vaZYH8mQ5iAtZ3xi2/s1600-h/skunsut2.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 242px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjicTm0vAak_YQq_p2m8ip0rKdskH8pnHNLrKTZxsKULVOsGItHYsQLDxqSxsDn08r9n5Y-J8umb06WIPSxJY_A6BvPLMFVKNAiQkg3RB7mYDDuF7NiLvNwfaVu_K4vaZYH8mQ5iAtZ3xi2/s320/skunsut2.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5308334803223814450&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Build with .NET Technology &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;If You Like this Program and want to look this source Request by Me.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Enjoy With Me&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.kitaupload.com/download.php?file=661Invisible%20File%20Locker.rar&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/3245400818978763940/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/03/my-program-invisible-file-locker-for.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3245400818978763940'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/3245400818978763940'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/03/my-program-invisible-file-locker-for.html' title='&quot;My Program&quot; Invisible File Locker for All &amp; Secure Crypting'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhXqcp-A4yz9YyFfKHrR_f2TdrE_-2T0G8qJWB9PE82xTWIf5qes4eetLvLoD9nk3taaw4yhlrLEqrsDgbd-hobqLVFO8fMXqEd5WZfAEvfR0Ib4ko8LdUneIUWKSpBtIa7mHVIsLZ76Ob/s72-c/skunsut.JPG" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-360283019179212729</id><published>2009-02-18T14:11:00.000-08:00</published><updated>2009-04-16T05:06:47.412-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="MySQL"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenSource"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><title type='text'>&quot;Digital Apotik&quot; Information System Base on Web with PHP 5 and MySql + Open Source</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Digital Apotik is Information system that to manage pharmacy effort with Digital Technology.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTOWuXRs0bkt4Y8Xk8qR9MvP1S9qiDqTWIxChW6NzktnQQTcZXMw2Tv9nXmENXj_tc4Gw7DKMPMCKkt9KHGXAETHO1d5iO9a2nNMncAToUCUwSzbLPTm8sLqqylaN8c70wfazlzsV70RW/s1600-h/skrin1apotik.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 230px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTOWuXRs0bkt4Y8Xk8qR9MvP1S9qiDqTWIxChW6NzktnQQTcZXMw2Tv9nXmENXj_tc4Gw7DKMPMCKkt9KHGXAETHO1d5iO9a2nNMncAToUCUwSzbLPTm8sLqqylaN8c70wfazlzsV70RW/s320/skrin1apotik.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5304273286779932306&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Digital Apotik is information system that made with application WebBased or web base application that can facilitate users either personal computer or computer that related to LAN network.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX_-KPSL9kP3LL1h0vGzGoqEi-mtXv0jg9lLXfYre0NeXCT84AmpmAOVxEHJTQbrCAuAAWfIbjUjCSSpWJldmJH9ll0Sy_yrqB6MF0x9QTLyQtN0qN1RdIS_nCqBxXZfkaPScqyBp5w2RN/s1600-h/skrin2apotik.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 226px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX_-KPSL9kP3LL1h0vGzGoqEi-mtXv0jg9lLXfYre0NeXCT84AmpmAOVxEHJTQbrCAuAAWfIbjUjCSSpWJldmJH9ll0Sy_yrqB6MF0x9QTLyQtN0qN1RdIS_nCqBxXZfkaPScqyBp5w2RN/s320/skrin2apotik.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5304273061855804994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Digital Apotik&quot;&lt;/span&gt; &lt;span style=&quot;font-style: italic;&quot;&gt;this I give free with license&lt;/span&gt; &lt;span style=&quot;font-weight: bold; color: rgb(255, 153, 0);&quot;&gt;&quot;Open Source&quot;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://moreittechnology.blogspot.com&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download in this Link&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Password :&lt;a href=&quot;http://invisible-digital.blogspot.com/&quot;&gt;http://invisible-digital.blogspot.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Invisible-Digital&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/360283019179212729/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/digital-apotik-information-system-base.html#comment-form' title='8 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/360283019179212729'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/360283019179212729'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/digital-apotik-information-system-base.html' title='&quot;Digital Apotik&quot; Information System Base on Web with PHP 5 and MySql + Open Source'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTOWuXRs0bkt4Y8Xk8qR9MvP1S9qiDqTWIxChW6NzktnQQTcZXMw2Tv9nXmENXj_tc4Gw7DKMPMCKkt9KHGXAETHO1d5iO9a2nNMncAToUCUwSzbLPTm8sLqqylaN8c70wfazlzsV70RW/s72-c/skrin1apotik.JPG" height="72" width="72"/><thr:total>8</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-1117699778614102485</id><published>2009-02-13T12:01:00.000-08:00</published><updated>2009-02-13T12:19:54.466-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Delphi"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><title type='text'>&quot;Invisible Process Service&quot; Build in Delphi 7 + Source Code</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;This Program to know hide process and service that is being run&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwz3nnZT9UG9cAKItZ_uqQI3_PXXOPa95g2Of-ffVq8SvEBl72oburVrZfv30luvRPyjDoYv2l9Br3ax0qQwgFyD9IphdKmoq-7l3ezPWqkEFsdC2sy3fnIfSj92lBWKDflywu2YhwkhIc/s1600-h/skrinsut.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 241px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwz3nnZT9UG9cAKItZ_uqQI3_PXXOPa95g2Of-ffVq8SvEBl72oburVrZfv30luvRPyjDoYv2l9Br3ax0qQwgFyD9IphdKmoq-7l3ezPWqkEFsdC2sy3fnIfSj92lBWKDflywu2YhwkhIc/s320/skrinsut.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5302378772552870882&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Support Ring-3...are you know ring-3...???&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;I think you know :D&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/197721507/Invisible_Service.zip.html&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/1117699778614102485/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/invisible-process-service-build-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1117699778614102485'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/1117699778614102485'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/invisible-process-service-build-in.html' title='&quot;Invisible Process Service&quot; Build in Delphi 7 + Source Code'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwz3nnZT9UG9cAKItZ_uqQI3_PXXOPa95g2Of-ffVq8SvEBl72oburVrZfv30luvRPyjDoYv2l9Br3ax0qQwgFyD9IphdKmoq-7l3ezPWqkEFsdC2sy3fnIfSj92lBWKDflywu2YhwkhIc/s72-c/skrinsut.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-8983308558169772562</id><published>2009-02-13T11:48:00.000-08:00</published><updated>2009-02-13T12:00:11.218-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Delphi"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><title type='text'>&quot;Digital FTP&quot; Build in Delphi 7 + Source Code</title><content type='html'>&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt;This is the FTP example that made with Delphi.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQOlAe3oA7q8PM189SlB-OHfOWXsOqEKiD1AD7Xvpt0aDlI9tW_bWwzODPxn9DO6Yd3-twFmlzQniKOuMrcwbZ8UqPw9UG2ywIeW1toIEqZUUPHCNXn7iMG87C3BxIsiGhjzmaauN2GspB/s1600-h/skinsooot.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 221px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQOlAe3oA7q8PM189SlB-OHfOWXsOqEKiD1AD7Xvpt0aDlI9tW_bWwzODPxn9DO6Yd3-twFmlzQniKOuMrcwbZ8UqPw9UG2ywIeW1toIEqZUUPHCNXn7iMG87C3BxIsiGhjzmaauN2GspB/s320/skinsooot.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5302372950157167442&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;This Program to enter data to server&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;interested with this programming example and code ?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/197722120/Digital_FTP.zip.html&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;InVisible-Digital&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/8983308558169772562/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/digital-ftp-build-in-delphi-7-source.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8983308558169772562'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/8983308558169772562'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/digital-ftp-build-in-delphi-7-source.html' title='&quot;Digital FTP&quot; Build in Delphi 7 + Source Code'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQOlAe3oA7q8PM189SlB-OHfOWXsOqEKiD1AD7Xvpt0aDlI9tW_bWwzODPxn9DO6Yd3-twFmlzQniKOuMrcwbZ8UqPw9UG2ywIeW1toIEqZUUPHCNXn7iMG87C3BxIsiGhjzmaauN2GspB/s72-c/skinsooot.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-4447684183469625427</id><published>2009-02-10T11:42:00.000-08:00</published><updated>2009-02-10T12:09:09.806-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="C#"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><title type='text'>Text 2 Music...With C# (VS 2008) + Source Code</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;This is a Invisible Project for Learn &lt;span style=&quot;font-weight: bold;&quot;&gt;C#&lt;/span&gt;.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFb4THLLT00ITHY0f8o3Tg_sn-FRyRClYuhS19nNNhV-8URg4TWU6KXefw6RyQ7Hg26m_Sr0Y2VsDffQ19x-2SPSTYDEdaJGq6jLKV9oC_TeMDCMZbCjME1CYFgQsZ_rhb1QUBf-Ph9wSC/s1600-h/skinsut.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 215px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFb4THLLT00ITHY0f8o3Tg_sn-FRyRClYuhS19nNNhV-8URg4TWU6KXefw6RyQ7Hg26m_Sr0Y2VsDffQ19x-2SPSTYDEdaJGq6jLKV9oC_TeMDCMZbCjME1CYFgQsZ_rhb1QUBf-Ph9wSC/s320/skinsut.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5301258001529582786&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Text 2 Music (Audio)&lt;/span&gt; is Application for Convert Text, MS.Word, RTF to &lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Audio (*.wav)&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;please used and hopefully useful&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/196493806/Teks2Musik.zip.html&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Download Here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/4447684183469625427/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/text-2-musicwith-c-visual-studio-2008.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/4447684183469625427'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/4447684183469625427'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/02/text-2-musicwith-c-visual-studio-2008.html' title='Text 2 Music...With C# (VS 2008) + Source Code'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFb4THLLT00ITHY0f8o3Tg_sn-FRyRClYuhS19nNNhV-8URg4TWU6KXefw6RyQ7Hg26m_Sr0Y2VsDffQ19x-2SPSTYDEdaJGq6jLKV9oC_TeMDCMZbCjME1CYFgQsZ_rhb1QUBf-Ph9wSC/s72-c/skinsut.jpg" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-5638105753559575670</id><published>2009-01-09T14:50:00.000-08:00</published><updated>2009-01-09T15:42:21.618-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="C++"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><title type='text'>Puzzle Game with &quot;C++&quot; (Include Source Code)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Do You want Play the Puzzle....???&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSP3D3mVJKiMUaQdgmYcuWvll3nqkJzIlbWBFBChzz63CXiLgWsiEqtNnU4qjgLgDd-7_YDQEaEMTj6A7BUM71Lv9YquoDSn8FKQqj13GbqrmjmqQOg-MircNOk5DK64kFVvaykOhDYLD5/s1600-h/screenshoot.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 316px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSP3D3mVJKiMUaQdgmYcuWvll3nqkJzIlbWBFBChzz63CXiLgWsiEqtNnU4qjgLgDd-7_YDQEaEMTj6A7BUM71Lv9YquoDSn8FKQqj13GbqrmjmqQOg-MircNOk5DK64kFVvaykOhDYLD5/s320/screenshoot.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5289442605275267938&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;this is a game with C++, one example Program Puzzle by Invisible&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/3145549/Puzzle.zip.html&quot;&gt;Download Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Happy Coding&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/5638105753559575670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/01/puzzle-game-with-c-include-source-code.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/5638105753559575670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/5638105753559575670'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/01/puzzle-game-with-c-include-source-code.html' title='Puzzle Game with &quot;C++&quot; (Include Source Code)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSP3D3mVJKiMUaQdgmYcuWvll3nqkJzIlbWBFBChzz63CXiLgWsiEqtNnU4qjgLgDd-7_YDQEaEMTj6A7BUM71Lv9YquoDSn8FKQqj13GbqrmjmqQOg-MircNOk5DK64kFVvaykOhDYLD5/s72-c/screenshoot.JPG" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4189040760447531254.post-2123344087600914210</id><published>2009-01-08T12:02:00.000-08:00</published><updated>2009-01-08T12:11:54.662-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Information"/><category scheme="http://www.blogger.com/atom/ns#" term="Knowledge"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Science"/><title type='text'>Free PHP Script from Invisible-Digital Part 2 (Port Kweker)</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Do You Want Scan Port....???&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Hiks :D  This is a simple scan port with &lt;span style=&quot;font-weight: bold;&quot;&gt;PHP&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Iztnw0UVsOrsGeqKa1NT7f07zLy3whTCvPDc0vy-G0YKVG2hRTs4ISqjTmvM2taPUaZfT7RHS939BsDNXMXcZ-draszWx1jNuBsl0ynR3qcignPj-0xMK9XMTIrCHQF_-SAlEWW21q3A/s1600-h/potrskater.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 216px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Iztnw0UVsOrsGeqKa1NT7f07zLy3whTCvPDc0vy-G0YKVG2hRTs4ISqjTmvM2taPUaZfT7RHS939BsDNXMXcZ-draszWx1jNuBsl0ynR3qcignPj-0xMK9XMTIrCHQF_-SAlEWW21q3A/s320/potrskater.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5289017219364972018&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Enjoy With Me&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ziddu.com/download/3136194/portkweker.zip.html&quot;&gt;Download Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;&quot;Invisible-Digital&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://invisible-digital.blogspot.com/feeds/2123344087600914210/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://invisible-digital.blogspot.com/2009/01/free-php-script-from-invisible-digital_08.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/2123344087600914210'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4189040760447531254/posts/default/2123344087600914210'/><link rel='alternate' type='text/html' href='http://invisible-digital.blogspot.com/2009/01/free-php-script-from-invisible-digital_08.html' title='Free PHP Script from Invisible-Digital Part 2 (Port Kweker)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/04029206508939773545</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Iztnw0UVsOrsGeqKa1NT7f07zLy3whTCvPDc0vy-G0YKVG2hRTs4ISqjTmvM2taPUaZfT7RHS939BsDNXMXcZ-draszWx1jNuBsl0ynR3qcignPj-0xMK9XMTIrCHQF_-SAlEWW21q3A/s72-c/potrskater.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>