OpCode

Hacking 2008. 9. 23. 03:18

opcode

From Wikipedia, the free encyclopedia

Jump to: navigation, search

In computer technology, an opcode (operation code) is the portion of a machine language instruction that specifies the operation to be performed. Their specification and format are laid out in the instruction set architecture of the processor in question (which may be a general CPU or a more specialized processing unit). Apart from the opcode itself, an instruction normally also has one or more specifiers for operands (i.e. data) on which the operation should act, although some operations may have implicit operands, or none at all. There are instruction sets with nearly uniform fields for opcode and operand specifiers, as well as others (the x86 architecture for instance) with a more complicated, varied length structure. [1]

Depending on architecture, the operands may be register values, values in the stack, other memory values, I/O ports, etc, specified and accessed using more or less complex addressing modes. The types of operations include arithmetics, data copying, logical operations, and program control, as well as special instructions (such as CPUID and others).

Contents

[hide]

[edit] Assembly

Assembly language, or just assembly, is a low-level programming language, which uses mnemonics, instructions and operands to represent machine code. This enhances the readability while still giving precise control over the machine instructions. Most programming is done using high-level languages, which are much easier to write, to perform larger tasks. These languages need to be compiled, to translate into machine language, or run through other programs compiled in machine language. [2]

[edit] Software instruction sets

Opcodes can also be found in so called byte codes and other representations intended for a software interpreter rather than a hardware device. These software based instruction sets often employ slightly higher-level data types and operations than most hardware counterparts, but are nevertheless constructed along similar lines. Examples include the Java programming language's Java Virtual Machine (JVM), the byte code used in GNU Emacs for compiled LISP code, and many others.[3]

'Hacking' 카테고리의 다른 글

Debugging of DLLs  (0) 2008.09.23
Assembly  (0) 2008.09.23
Changing Start Button text in Win XP  (0) 2008.09.22
Changing your Windows Login Screen During startup  (0) 2008.09.22
[CEH] Certified Ethical Hacker : Hacking Process  (1) 2008.09.21
Posted by CEOinIRVINE
l