I have been looking for this answer for a while now, I know that in some hack shields, they basicly make an application run to replace pb, and give fake outputs. May someone explain to me how the bypassing of pb works....Its just i'm so board I wan't somthing more fun then just writing process memory.