Introduction - If you have any usage issues, please Google them yourself
DIY Trojan program features the first implementation of a Trojan horse program DIY section 2 of the Trojan horse program is running a single instance of DIY section 3 of the asterisk password viewing tool Trojan Programming DIY section 4 of the System Services Programming DIY Trojan 5 chapter of the text to speech program Trojan DIY section 6 of the registry management program Trojan DIY section 7 of the thread guard DIY section 8 Trojan programming service enabling technologies Trojan programming DIY section 9 of the voice control Trojan horse program DIY Article 10 of the network of Trojan horse program to monitor the process of DIY article 11 of the file transfer a frame structure and interface programming to achieve Trojan DIY section 12 of the file transfer function to achieve two Trojan programming DIY section 13 of the file transfer three breakpoints Continued transmission and multi-threaded transfer