CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - virus
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - virus - List
[
Software Engineering
]
hwb12pdf
DL : 0
硬盘以及分区结构简介。 硬盘分区表和文件分配表 硬盘只有经过物理格式化,分区,逻辑格式化后才能使用,在进行分区时,FDISK 会在硬盘的0柱面0磁头1扇区建一个64字节的分区表,在分表的前面是主引导记录 (MRB),后面是两个字节的有效标志55H,AAH,(H表示16进制)。此扇区被称为主 引导扇区,也是病毒最爱侵袭的地方,它由主引导记录+分区表+有效标志组成。 分区表对于系统自举十分重要,它规定着系统有几个分区;每个分区的起始及终止 扇区,大小以及是否为活动分区等重要信息。分区表由4个表项组成,每个表项16个字 节-hard on the structure and zoning. Hard disk partition table and document distribution table only after physical hard disk formatting, zoning, logical format as soon as possible. conducting district, FDISK the hard drive in cylindrical 0 0 1 Sector Head built a 64 bytes of zoning tables at the table in front of the Master Boot Record (MRB), followed by two bytes of effective signs 55 H, AAH, (H said 16-band). This was known as Sector master boot, as well as virus attacks favorite place, which consists of master boot record partition table effective symbol. Table system for the district since cite important, it provides a system has several branch; The start of each branch and terminate Sector. and whether the size of district activities and other important information. Division 4 table by t
Date
: 2008-10-13
Size
: 739.38kb
User
:
zgb
[
Software Engineering
]
fanbingdu
DL : 0
反病毒引擎设计 ,一个写论文时的质料,供大家参考。-anti-virus engine design, write an essay of the material for reference.
Date
: 2008-10-13
Size
: 37.66kb
User
:
李红
[
Software Engineering
]
bngdu
DL : 0
因本人工作关系,长时间接触病毒,收集了不少关于手机方面的病毒资料,今日拿出来供大家分享,这可是独一无二的-because I work, prolonged exposure to the virus, collect a lot of cell phone virus, out today for everyone to share, and this unique
Date
: 2008-10-13
Size
: 182.83kb
User
:
qerde
[
Software Engineering
]
biyesheji_jiyuACLdewangluo
DL : 0
毕业设计论文-反病毒的 随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。 本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。 -Design graduate thesis - with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol
Date
: 2008-10-13
Size
: 124.96kb
User
:
thocr
[
Software Engineering
]
Windows文件系统过滤驱动开发教程
DL : 1
我经常在网上碰到同行请求开发文件系统驱动。windows的pc机上以过滤驱动居多。其目的不外乎有以下几种: 一是用于防病毒引擎。希望在系统读写文件的时候,捕获读写的数据内容,然后检测其中是否含有病毒代码。 二是用于加密文件系统,希望在文件写过程中对数据进行加密,在读的过程中进行解密。 三是设计透明的文件系统加速。读写磁盘的时候,合适的cache算法是可以大大提高磁盘的工作效率。windows本身的cache算法未必适合一些特殊的读写磁盘操作(如流媒体服务器上读流媒体文件)。设计自己的cache算法的效果,我已在工作中有所感受。 如果你刚好有以上此类的要求,你可以阅读本教程。-I often encounter online request peer file system driver development. Windows on the pc-driven mostly to filter. Its goal : There are several : First, for the anti-virus engine. Hope for writing the document, read and write data capture, which then detected the presence of the virus code. Two documents for encryption systems in the hope that the process of writing papers for data encryption, in the course of time deciphering. Three is to design a transparent file system accelerated. The disk read and write when appropriate cache algorithm can greatly improve the efficiency of disk. Windows itself to the cache algorithm may not be suitable for some special disk read and write operations (such as streaming media server time streaming media). The cache design algorithm results, I have some wo
Date
: 2025-12-16
Size
: 18kb
User
:
仇韬
[
Software Engineering
]
2jinzhibindusaomiao
DL : 0
针对二进制病毒的启发式扫描技术 很不错的毕业论文。- In view of binary virus s heuristic scanning technology very good graduation thesis.
Date
: 2025-12-16
Size
: 53kb
User
:
程序员张
[
Software Engineering
]
hwb12pdf
DL : 0
硬盘以及分区结构简介。 硬盘分区表和文件分配表 硬盘只有经过物理格式化,分区,逻辑格式化后才能使用,在进行分区时,FDISK 会在硬盘的0柱面0磁头1扇区建一个64字节的分区表,在分表的前面是主引导记录 (MRB),后面是两个字节的有效标志55H,AAH,(H表示16进制)。此扇区被称为主 引导扇区,也是病毒最爱侵袭的地方,它由主引导记录+分区表+有效标志组成。 分区表对于系统自举十分重要,它规定着系统有几个分区;每个分区的起始及终止 扇区,大小以及是否为活动分区等重要信息。分区表由4个表项组成,每个表项16个字 节-hard on the structure and zoning. Hard disk partition table and document distribution table only after physical hard disk formatting, zoning, logical format as soon as possible. conducting district, FDISK the hard drive in cylindrical 0 0 1 Sector Head built a 64 bytes of zoning tables at the table in front of the Master Boot Record (MRB), followed by two bytes of effective signs 55 H, AAH, (H said 16-band). This was known as Sector master boot, as well as virus attacks favorite place, which consists of master boot record partition table effective symbol. Table system for the district since cite important, it provides a system has several branch; The start of each branch and terminate Sector. and whether the size of district activities and other important information. Division 4 table by t
Date
: 2025-12-16
Size
: 739kb
User
:
zgb
[
Software Engineering
]
windows_process_dispatchAnd_anti_kill_memery
DL : 0
[转] NT 内核的进程调度分析笔记.htm 对抗杀毒软件的内存扫描.htm-[switch] NT kernel process scheduling analysis notes. Htm confrontation anti-virus scanning software memory. Htm
Date
: 2025-12-16
Size
: 9kb
User
:
bobo
[
Software Engineering
]
fanbingdu
DL : 0
反病毒引擎设计 ,一个写论文时的质料,供大家参考。-anti-virus engine design, write an essay of the material for reference.
Date
: 2025-12-16
Size
: 37kb
User
:
李红
[
Software Engineering
]
bngdu
DL : 0
因本人工作关系,长时间接触病毒,收集了不少关于手机方面的病毒资料,今日拿出来供大家分享,这可是独一无二的-because I work, prolonged exposure to the virus, collect a lot of cell phone virus, out today for everyone to share, and this unique
Date
: 2025-12-16
Size
: 183kb
User
:
qerde
[
Software Engineering
]
biyesheji_jiyuACLdewangluo
DL : 0
毕业设计论文-反病毒的 随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。 本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。 -Design graduate thesis- with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol
Date
: 2025-12-16
Size
: 125kb
User
:
thocr
[
Software Engineering
]
How_to_write_virus
DL : 0
写病毒程序可以使用很多种语言来写比如C,汇编,甚至有人用Dephi这样可视化编程工具都能写出来。但是最适合写病毒程序的还是汇编语言。本文交你如何用汇编编写简单的病毒程序,以此了解病毒机理。-Write virus program can be used to write very many languages such as C, compile, and even someone such Delphi visual programming tools can write it down. But the most suitable for write-virus program or assembly language. In this paper, how you pay to prepare the compilation of a simple virus program in order to understand the mechanism of the virus.
Date
: 2025-12-16
Size
: 9kb
User
:
晓龙
[
Software Engineering
]
proj3_18
DL : 0
著名的“CIH病毒”每年定时发作,其中就需要利用定时器来控制程序的执行-The famous CIH virus regularly attack each year, which would require the use of timers to control the implementation of the procedures
Date
: 2025-12-16
Size
: 1kb
User
:
郭荣
[
Software Engineering
]
CIH
DL : 0
大家都很讨厌CIH 病毒,可我们:“要一分为二地看问题”,CIH病毒很可怕,但是它使用的某些特殊技术还是可以借鉴的,这样可以做到变害为利。-We all hate CIH virus, can we: 要一分为二look at the issue , CIH virus is a very terrible, but it used some special technology and can draw on, so that change can do harm Wei.
Date
: 2025-12-16
Size
: 2kb
User
:
chen
[
Software Engineering
]
rx2005
DL : 0
瑞星杀毒软件网络版防病毒解决方案技术白皮书-Rising Anti-Virus Network Edition anti-virus software solutions, technical white paper
Date
: 2025-12-16
Size
: 420kb
User
:
zwb
[
Software Engineering
]
Basedonstructuralanalysisandmathematicalmodelofcom
DL : 0
基于结构分析与数学模型的计算机病毒 基于结构分析与数学模型的计算机病毒-Based on structural analysis and mathematical model of the computer virus based on analysis and mathematical model of the structure of the computer virus
Date
: 2025-12-16
Size
: 15kb
User
:
王袍
[
Software Engineering
]
Document
DL : 0
Please do not upload copyrighted content and the file which has trojan or virus
Date
: 2025-12-16
Size
: 1kb
User
:
Le
[
Software Engineering
]
5
DL : 0
simple project to reject virus/worm a-patch3
Date
: 2025-12-16
Size
: 592kb
User
:
ice
[
Software Engineering
]
qifa
DL : 0
nod32 的启发式分析,检测未知病毒技术的白皮书。-nod32 heuristic analysis to detect unknown virus technology, the White Paper.
Date
: 2025-12-16
Size
: 394kb
User
:
alvin
[
Software Engineering
]
Virus---huyen-thoai-hay-thuc-te
DL : 0
Virus - huyen thoai hay thuc te
Date
: 2025-12-16
Size
: 610kb
User
:
HunterSoft
«
1
2
3
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.