Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Windows Develop Hook api

Search in result

Hook api list
Sort by :
« 1 2 ... .16 .17 .18 .19 .20 421.22 .23 .24 .25 .26 ... 486 »
Downloaded:0
Win32API table, the use of function parameters Win32API table form, function of use, the form parameters, such as
Date : 2008-10-13 Size : 344.27kb User : zhoujie

Downloaded:0
A hook procedure that is mainly used to lock the keyboard and mouse
Date : 2008-10-13 Size : 236.08kb User : zhangtao

Downloaded:0
The main function of the mouse hook the understanding and use instructions on how to prepare the user hook function
Date : 2008-10-13 Size : 66.92kb User : thf

Downloaded:0
A hookapi example, learning the overall hook, through the NDIS API kernel HOOK achieved. Norton is also heard to use this method to achieve.
Date : 2008-10-13 Size : 143.72kb User : f101

Downloaded:0
To achieve the overall situation in the EXE in the EXE hook HOOK achieve global hook HOOK
Date : 2008-10-13 Size : 195.3kb User : lihuanglong

Downloaded:0
This is an edit/view PE file Export Table tool. It can be convenient to use for PE files by exporting table, delete, change operations, and now it can be used to export the table did not add export function. PE diy this
Date : 2008-10-13 Size : 94.81kb User : 董林

Downloaded:1
Start.exe installation of Insert.dll hook WH_GETMESSAGE. When any one process from the message queue check news, Insert.dll will be put into its space. Insert.dll at the entry code to enter the process to determine the c
Date : 2008-10-13 Size : 29.68kb User : hss

Downloaded:0
With the use of ShellExecuteHook process is automated.
Date : 2008-10-13 Size : 60.23kb User : hss

Downloaded:0
This paper mainly introduces how to replace the API function of Windows to achieve Windows API Hook (Of course, the Hook is only one socket of a special case). Hook API such technology are widely used in a number of area
Date : 2008-10-13 Size : 7.07kb User : AQIANG

Downloaded:0
MINI generation that those who download, you need to own a tool. Read code, the corresponding part of encryption can be. Reference delphi version of those who download the source code, made out there is about 16K. Compre
Date : 2008-10-13 Size : 2.46kb User : AQIANG

Downloaded:0
err
Date : 2008-10-13 Size : 3.87kb User : AQIANG

Downloaded:0
Trojans run the key is hidden,神不知鬼不觉kingcraft is. To hide, we must hide the process, Windows operating system procedures to proce
Date : 2008-10-13 Size : 3.53kb User : AQIANG
« 1 2 ... .16 .17 .18 .19 .20 421.22 .23 .24 .25 .26 ... 486 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.