搜索资源列表
实现文件共享(sample)
- 在居于网内实现Window的文件共享,和在Windows通过菜单选择共享一样。我想有些病毒可以实现自动共享应该是和这个原理差不多-in living within Window network file sharing and the Windows through sharing the same menu choice. I think some of the virus can be automatically shared and this principle is almost
xfprot
- 商业版的F-Prot防病毒软件的图形前端。-the graphics forward of F-Prot anti-virus software for business.
VB编写病毒的大体方法
- 用VB写的病毒程序,本程序只适用于研究,不可传播.-the general method of VB virus programing.Only for research. Do not spread it.
windows系统进程
- 常见的windows中出现的进程名称。非常详细,连诺顿等的常用软件的进程名都有,还包括可能的病毒进程。并且有相关操作建议。-common windows appeared name in the process. Very detailed, and even the Norton software used in the process were there, including the possibility of the virus process. Operation and relev
CIH病毒1.4版源代码
- CIH病毒1.4版源代码是根据病毒的形成原理编制给大家参考-CIH virus version 1.4 source code is based on the principle of forming virus preparation for your reference
病毒主程序分析
- 分析了一个病毒的程序,与大家分享,请赐教-analysis of a virus procedures, and to share with you, please enlighten
dosstamem
- ★★DOS常驻内存程序[原创]★★ 也许大家不理解意思。 驻留内存的意思就是 1)不能影响其他程序的运行。 2)自我复制。 3)某种情况下进行破坏(比如4月16日)。 对于DOS程序(病毒)来说,你起码要篡改一个中断。然后在你的中断程序中把真实的中断做一次,就神不知鬼不觉了 下面我以篡改键盘中断的病毒解释一个例子。-** DOS memory Permanent procedures [original] * Perhaps they do not unders
BasedService
- 基于服务方式的http代理.程序使用: BasedService8080.exe -install 安装服务 BasedService8080.exe -remove 删除服务 安装并启动服务: 步骤: BasedService8080.exe -install net start windowsmgr 附:会被杀毒软件当作病毒处理-based means of service http agent. Procedure : BasedService8080.
杀毒软件源码
- 杀毒软件源码.zip,学习病毒、防火墙的好资料-antivirus software source code. Zip, study the virus, firewall good information
2jinzhibindusaomiao
- 针对二进制病毒的启发式扫描技术 很不错的毕业论文。- In view of binary virus s heuristic scanning technology very good graduation thesis.
杀毒原形程序
- 搜索硬盘中的特殊文件,如*.tmp文件,可以用来搜索中病毒后的特殊文件,类似于Windows中的搜索功能-search drives the special documents, such as *. tmp files that can be used to search the virus after the special paper, similar to the Windows search function
chinahack源代码
- chinahack源代码 中国黑客病毒的源代码,希望对病毒有研究的朋友好好看看,用到了一些新的技术-chinahack source code Chinese hackers virus source code, and I hope to study the virus carefully to see friends, use of new technology
U盘大盗的关键代码
- U盘大盗的关键代码,但并没有使之可以当病毒一样用。可以检测U盘插入事件,并将U盘上的文件拷贝到C:\\Temp下。一切后果我本人不承担。-U bandit who was the key code, but not to make them when using the same virus. U disk can detect insertion events and the U-copy documents to C : \\ Temp under. All the consequences
GAYBIN
- 关于感染型病毒行为基本原理的源代码。 1、熟悉PE结构,掌握感染过程。 -virus infection on the behavior of the basic tenets of the source code. A familiar with the structure of PE, master infection process.
A780c
- 一种病毒的源码,熟悉之后就可以针对这种病毒写出破解程序.-a source of the virus, after the familiar against the virus can write crack procedures.
Door
- 一个VB 病毒源代码,在文件内已详细的注释,只供学习,别搞破坏 。-a VB virus source code, the paper has detailed notes, only to learn that other acts of sabotage.
VB代码库 1.1
- VB代码库 1.1版的 请大家放心下载 绝对没用病毒!!1-VB code for the 1.1 version Please rest assured download virus absolutely useless! ! 1
Kylinx 2003 病毒源程序
- Kylinx 2003 病毒源程序-Kylinx 2003 virus source
AsmAdjust
- 第三方执行代码侵入方法,常用于病毒/反病毒技术。即在一个已编译完成的PC可执行代码中嵌入自己的可执行代码,并不干扰原程序。侵入级别在物理代码地址级别,低与Rin3级。有很强的攻击性。-third-party code execution invasive method, commonly used in HIV / anti-virus technology. That is compiled in a complete PC executable code embedded in the ex
计算机病毒原理与反病毒工具
- 本书分为两个部分.第一部分介绍了病毒基础知识和反病毒工具的使用方法.第二部分深入DOS内部介绍病毒原理.使用与中高级人员参考!-the book is divided into two parts. The first part gives a basic knowledge of the virus and anti-virus tools use. The second part of the internal DOS-depth briefing virus theory. Senior