Briefly explain how software reverse engineering could be used for legitimate purpose.Briefly describe 2 (two) tools that can be used for reverse engineering of software.Why is it easier to decompile Java bytecode than native code?When patching an executable, it is important not to add or remove even a single byte. Explain why.What are the advantages and disadvantages of code obfuscation?Briefly explain any anti-disassembly technique.Briefly explain any anti- debugging technique.Briefly explain advantages and disadvantages of an honor system DRM.What are the advantages and disadvantages of security by obscurity?Briefly explain why scrambling part of the MediaSnap DRM does not violate Kerckhoffs' Principle.Briefly explain the concept of NGSCB.What are the advantages and disadvantages of an analog hole from the attacker's perspective?Briefly explain technical details and architecture of Bittorrent.Do you think the peer review of code is more or less efficient than testing? Explain your answer.Do you think Linus's law is correct or is it a fallacy? Explain your answer..