Fictional architecture, the new register – it all depends on the sophistication of the imagination. But it is unlikely Do you think the person who is reading my article, will be able to correctly implement this protection – it needs to devote his entire life to studying the architecture of the pc sit behind a computer for 10-15 hours a day, making minor interruptions to sleep, eat and relieve themselves. There are such people – they are real professionals and gurus in their field. Few know perfectly all the documentation from Microsoft and Intel on the description of the functioning of the operating system and processor (which is many thousands of pages covered codes for which no tears will not look). Also need to practice a lot, read lots of information for knowledge of many of the "stuff". Is not always all be described in various manuals for various reasons, many things are hidden or distorted by fictitiously.
Knowledge of these undocumented features of the architecture enables the development of truly professional system. Deserves attention and information on hacker tools. Some of these programs really are invaluable, but again they all have a lot of undocumented things, bugs. If such a program is commercial, then theoretically, the developer that there is a reason it constantly modifying, responsive to expression of thousands of users. But the lazy man's rises – not all find time to do it. In addition, commercial programs this exotic niche is not so much, and so everything is kept solely on the enthusiasm of the developers (ka).