This is discussion archived from a time before the current discussion method was installed.
Hollywood Hacking launched as HollywoodHackingDiscussion: From YKTTW
Working Title: Hollywood Hacking: From YKTTW
Nornagest: Cut —
- ** You'd think the computer club would have realised something was up though seeing as she had access to the bin and not the source. But then the masquerade is mostly for Haruhi's sake.
It is possible to change the execution flow of a binary program by overwriting carefully selected segments of memory — in fact, a variation on this is how many computer-security exploits work (via a jump-to-register attack or something similar). Doing this on the fly, to a running program, would be fantastically difficult without special tools. While it's probably impossible for any human, however, it's not theoretically impossible — which is the whole point of the example.
Excel-2009.