Welcome![Sign In][Sign Up]
Location:
Search - computer hacking

Search list

[Exploitwangluobaojiequ

Description: 实现对网络安全的保障,对入侵计算机的数据包进行截取检测 -realization of network security for the protection of computer hacking of data packets for an interception Detection
Platform: | Size: 81162 | Author: 杜维维 | Hits:

[Other击键记录器原代码

Description: 键盘记录小程序由杀毒防马研究组整理收集~~~~~~~QQ群:1938484声明:这些资料做群内成员学习之用,不得利用这些代码破坏他人电脑-keylogger small program by antivirus-MA Study Group collating iPAQ group QQ : 1938484 : do these data members within the group learning, not to use these codes damage to computer hacking
Platform: | Size: 9783 | Author: 斯拉普 | Hits:

[Other击键记录器原代码

Description: 键盘记录小程序由杀毒防马研究组整理收集~~~~~~~QQ群:1938484声明:这些资料做群内成员学习之用,不得利用这些代码破坏他人电脑-keylogger small program by antivirus-MA Study Group collating iPAQ group QQ : 1938484 : do these data members within the group learning, not to use these codes damage to computer hacking
Platform: | Size: 10240 | Author: 斯拉普 | Hits:

[OS programwangluobaojiequ

Description: 实现对网络安全的保障,对入侵计算机的数据包进行截取检测 -realization of network security for the protection of computer hacking of data packets for an interception Detection
Platform: | Size: 80896 | Author: 杜维维 | Hits:

[Hook apigetmobilemsg

Description: 当计算机中插入优盘时,自动将将U盘上的资料直接拷贝到硬盘中。如果您需要对方优盘上的资料,你可以先运行本程序,当将对方的优盘插入到你的计算机上时会自动将优盘上的文件拷贝到你的电脑中的c:\program files\winrar目录下。 黑客工具! 运行copy.exe后就在你的计算机上设立了一个陷阱!-When inserted into USB computer automatically will be information on the U disk directly copy to your hard disk. If you need other information on the USB, you can run this program, when will the other side of the USB plug into your computer will automatically copy the files on the USB to your computer c: program fileswinrar directory under. Hacking tools! Copy.exe after running in your computer set up a trap!
Platform: | Size: 331776 | Author: | Hits:

[Hook apigetmobileresource

Description: 当计算机中插入优盘时,自动将将U盘上的资料直接拷贝到硬盘中。如果您需要对方优盘上的资料,你可以先运行本程序,当将对方的优盘插入到你的计算机上时会自动将优盘上的文件拷贝到你的电脑中的c:\program files\winrar\format\id 目录下。 黑客工具! 运行copy.exe后就在你的计算机上设立了一个陷阱!-When inserted into USB computer automatically will be information on the U disk directly copy to your hard disk. If you need other information on the USB, you can run this program, when will the other side of the USB plug into your computer will automatically copy the files on the USB to your computer c: program fileswinrar ormatid directory. Hacking tools! Copy.exe after running in your computer set up a trap!
Platform: | Size: 195584 | Author: | Hits:

[Crack HackCODES

Description:   本书所介绍的内容旨在研究Windows应用程序之间的通信、挂钩和捆绑的技术,为编写通信、加密、翻译和计算机安全等软件服务。有些内容与黑客技术相关,但这些知识旨在使人们深入认识黑客技术内幕,提高对计算机的防护意识-The book described the contents of Windows applications is to study communication between linked and bundled technology, for the preparation of communications, encryption, computer security, such as translation and software services. Some technology-related content and hackers, but the depth of knowledge aimed at making people aware of insider hacking technology to raise awareness of computer protection
Platform: | Size: 118784 | Author: 陈新秋 | Hits:

[OtherMcGraw.Hill.Osborne.Media.Hacking.Exposed.Sixth.E

Description: The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.
Platform: | Size: 9222144 | Author: holahola | Hits:

[OtherLEXX14CS

Description: LEXX can be used as a remote administrating tool or as a hacking tool. It consists of two files: server.exe & LEXX.exe. To use it, run server.exe on the victim s computer [Don t ask me how! Figure that out by yourself], find his/her IP number then run LEXX.exe onto your computer. That s about it, after that you can really have some fun with the victim.- LEXX can be used as a remote administrating tool or as a hacking tool. It consists of two files: server.exe & LEXX.exe. To use it, run server.exe on the victim s computer [Don t ask me how! Figure that out by yourself], find his/her IP number then run LEXX.exe onto your computer. That s about it, after that you can really have some fun with the victim.
Platform: | Size: 147456 | Author: Donce | Hits:

[OtherIntroToCrypto.pdf

Description: Computer Security and Cryptography for DRM and hacking related subjects.
Platform: | Size: 861184 | Author: Bob | Hits:

[Industry researchhacking

Description: Hacking (English verb to hack, singular noun a hack) refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem, such as a "kludge".
Platform: | Size: 454656 | Author: utkarsh | Hits:

[OS programrumenheikejiaocheng

Description: 这是一个入门级的黑客教程,简单易学,理论与实践兼顾。当然这仅仅是作为一个黑客的入门指导,有兴趣的童鞋看后想深研,自己去发掘吧。这里仅作为计算机的攻防理念的分享。看此资料者,如果对集体社会国家作出任何损害,概与本人无关。请大家凭一颗正义的心阅读此文献,分享成果,发挥自我的贡献-This is an entry-level hacking tutorials, easy to learn, theory and practice take into account. Of course this is just the entry as a hacker Guidance, are interested in children s shoes to see deep research, to discover it. Here only as a share of the computer s offensive and defensive philosophy. Look at this Data, if any damage to the collective society and the country takes and I have nothing. Please read this article with a righteous heart Offer to share results, to play the self-contribution
Platform: | Size: 52224 | Author: 留小哦 | Hits:

[Software EngineeringPC

Description: 从电脑初学者的角度来讲解黑客入侵的基本原理与观念,IP的隐藏和研究,一般电脑的入侵和修补技术-From the point of view of computer beginners to explain the basic principles and concepts of hacking, IP s hide and research, general computer intrusion and repair technology
Platform: | Size: 12481536 | Author: 赵莫莫 | Hits:

[Software EngineeringHacking.Exposed.6Th.Ed

Description: 计算机安全 《黑客大曝光:网络安全机密与解决方案(第6版)》是全球销量第一的计算机信息安全图书,被信息安全界奉为圣经。作者独创“黑客大曝光方法学”,从攻防两方面系统阐述了最常见的黑客入侵手段及对应的防御策略-Computer security, " Hacking Exposed: Network Security Secrets and Solutions (6th Edition)" is the first global sales of computer information security books, regarded as the Bible, the information security community. Of the original " Hacking Exposed methodology, described the most common means of hacking and defense strategy from both attack and defense system
Platform: | Size: 8121344 | Author: renjiawei | Hits:

[Othernetwork-security

Description: 计算机网络安全机密与解决方案-黑客大曝光-Computer network security secrets and solutions- Hacking Exposed
Platform: | Size: 8863744 | Author: 赵辉 | Hits:

[OtherHacking

Description: Welcome to Hacking For Dummies, 4th Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your information systems, find the security vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious users take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I call ethical hacking throughout the book.
Platform: | Size: 14005248 | Author: amine | Hits:

[JSPComputer-Viruses--Hacking-and-Malware-attacks-for

Description: hacking with java, computer visrus coding
Platform: | Size: 2467840 | Author: kiran | Hits:

[OtherA-Beginners-Guide-To-Hacking-Computer-Systems

Description: Guides of the Beginner s Series: So you want to be a harmless hacker? Hacking Windows 95! Hacking into Windows 95 (and a little bit of NT lore)! Hacking Windows 3.x, 95 and NT How to Get a *Good* Shell Account, Part 1 How to Get a *Good* Shell Account, Part 2 How to use the Web to look up information on hacking. Computer hacking. Where did it begin and how did it grow?-Guides of the Beginner s Series: So you want to be a harmless hacker? Hacking Windows 95! Hacking into Windows 95 (and a little bit of NT lore)! Hacking Windows 3.x, 95 and NT How to Get a *Good* Shell Account, Part 1 How to Get a *Good* Shell Account, Part 2 How to use the Web to look up information on hacking. Computer hacking. Where did it begin and how did it grow?
Platform: | Size: 567296 | Author: kassapoglu | Hits:

[OtherHacker-HighSchool---13-ebooks

Description: Welcome to the Hacker Highschool program! This program is designed to encourage you to be well-rounded and resourceful. The core instruction theme is to harness the hacker curiosity in you and to guide you progressively through your hacker education to help you grow into a responsible role, capable of determining security and privacy problems and making proper security decisions for yourself. While there is a thrill to hacking partly because of the illegal nature of computer trespass, we want to show you that it is just as big a thrill to alert others about lapses in security and make them public without worrying about going to jail over it. As a citizen of most countries, it is not only your right, but your responsibility, to report security and privacy leaks to the proper authorities. You do this not because you can, but because many other people can t. You are helping those who can t help themselves. This is what watchdog groups do. This is what you will learn to do. 5
Platform: | Size: 4017152 | Author: kassapoglu | Hits:

[OtherThe_Cuckoo's_Egg_Tracking_a_Spy.pdf

Description: Tracking a Spy Through the Maze Of Computer Espionage
Platform: | Size: 802816 | Author: white_bob | Hits:

CodeBus www.codebus.net