While researching for my book ("Malware : Writing Malicious Code"), I came across this-

Now my question is-

How can I emulate an API, for example, How can I write code that'll manipulate...