Welcome![Sign In][Sign Up]
Location:
Search - horse

Search list

[Other resourceKillMuMa

Description: 中木马是每个人都十分头疼的一件事,这本电子书内介绍了104种清除木马方法,相信对清理你电脑中的木马应该会大有帮助吧-Trojan which everyone is a great headache for the incident, This e-books within 104 species on the removal of Trojan horse, sure to clean up your computer Trojan horse should it will be of great help
Platform: | Size: 37844 | Author: 何冰 | Hits:

[Other resourcehacker_encrypt_decrypt

Description: 关于软机破解,木马、加解密的图书。认清黑客的目的与手法,可以有效的加以防范。-on crack, Trojan horse, plus declassified books. Hackers understand the purpose and practices, can effectively be prevented.
Platform: | Size: 7434285 | Author: kurt | Hits:

[Other resourcemataqipan00122121

Description: 这是数据结构的一个课程设计.马踏棋盘,其中包含两种算法.一种只有一条路线,另一种有多条路线.还有设计文档.希望对大家有用.-This is the data structure of a curriculum design. Horse riding chessboard. which includes two algorithms. Only one of a line, A number of other routes. There design documents. We hope that the right useful.
Platform: | Size: 34842 | Author: jannock | Hits:

[Other resourcepppppp

Description: 计算欧氏距离和马式距离的程序,可以实现不同图像之间的分类。-calculated Euclidean distance and horse-distance procedures can be achieved between different image classification.
Platform: | Size: 9270 | Author: wang | Hits:

[Other resourcewzdnjbgn

Description: 细介绍: 在你的计算机上,有20-30个进程在后台运行着。有的占用了太多的系统资源,造成机器运行缓慢。更为不幸的是,一些进程是间谍软件和木马,如此你的隐私和机器的控制权会被黑客所掌控。这里提供了大多数常见的进程知识。这里的分类包括:存在安全风险进程列表 系统进程列表 应用程序进程列表 其它进程列表 DLL文件列表 ,,CHM,EBooks -detailed presentations : in your computer, 20-30 process running in the background. Some had taken up too much of the system resources, causing the machine run slow. Even more unfortunate is that some process is spyware and Trojan horse, so your privacy and the right to control the machines will be controlled by hackers. Here to provide the most common knowledge of the process. Categories included here : security risks exist systematic process process list of links application process list of links to other process DLL files list. CHM, EBooks
Platform: | Size: 565729 | Author: tao | Hits:

[BREWE808ZCDG5-FULL

Description: 三星E808水改机H1版刷机程序。行机和马行勿用。-water diverted for H1 version Brush procedures. OK machines and horse OK not to use.
Platform: | Size: 5111339 | Author: 力杰 | Hits:

[Firewall-Securityhtml_decode

Description: 加密HTML代码的东东,很小,但是很有用。 可以保护你的网马,并使其免杀。推荐!-encryption HTML code Eastern, a small, but very useful. Can protect your network horse, and avoid killing it. Recommended!
Platform: | Size: 8769 | Author: 刘叶 | Hits:

[Embeded-SCM Developrushing

Description: A six people s rushing replies an implement, use some s switches in toggle switch K0 ~ K5 is that ON accomplishes when rushing to reply button , nobody rush to answer, 6 numerical code circulation takes turns at demonstrating 1 ~ 6 (horse races) , who rushes to reply the numerical code stops having a ride on a horse , first, whose serial number, has simultaneous light of 6 numerical codes again afterwards the key presses down. System denies responding to, until this place is OFF batch , the wheel restoring 1 ~ 6 horse races starting time as soon as rushes to answer.
Platform: | Size: 1205 | Author: gggwffg | Hits:

[Exploitmmtd1.1

Description: 一个木马代码 功能比较全面 1.文件管理:模枋 Windows 资源管理器,可以对文件进行:复制、粘贴、删除,重命名、远程运行等,可以上传下载文件或文件夹,操作简单易用。 2.远程控制命令:查看远程系统信息、剪切板查看、进程管理、窗口管理、外设控制、服务管理、共享管理、代理服务、MS-Dos模拟、其它控制! 3.捕获屏幕:不但可以连继的捕获远程电脑屏幕,还能把本地的鼠标及键盘传动作送到远程实现实时控制功能! 4.注册表模拟器:远程注册表操作就像操作本地注册表一样方便!-a Trojan horse code a more comprehensive function. Document management : Die Fang Windows Explorer, on documents : copy, paste, delete, rename, long-distance running, and can upload or download files folder, easy and simple operation. 2. Remote control commands : View remote system information, Shear panel View, process management, window management, control of peripherals, service management, Sharing management, agency services, MS - Dos simulation and other control! 3. Capture screen : not only can not even following the capture remote computer screen, also to bring to the local traditional keyboard and mouse movements to achieve real-time remote control function! 4. Register Simulator : remote operation of the registry to operate like local registry as easy!
Platform: | Size: 1967280 | Author: 校风 | Hits:

[Other resource23aweasdasd

Description: 这就是个木马的说明文件 仅共有兴趣的人士下载没什么兴趣的人请不要浪费时间谢谢合作-This is a Trojan horse of the documents were only interested in downloading no interest in the people do not waste time Thank you for your cooperation
Platform: | Size: 14297 | Author: weqweqw | Hits:

[Delphi VCLcBarCodeTest

Description: 条形码程序测试,对条马的打印测试程序,用户可以下载自已测试使用。-barcode testing procedures, the right of the horse's Print testing procedures, users can download their own test to use.
Platform: | Size: 22140 | Author: 庄向军 | Hits:

[Hook apihook_hide_proc

Description: 进程隐藏代码.可以隐藏指定名称的进程,对于木马软件来说,这是必备的功能-process hidden code. Assigned Names can be hidden in the process, the Trojan horse software, this is an essential function
Platform: | Size: 3503 | Author: dhyao | Hits:

[Other resourcejz3.5source2007

Description: 我们共提供了两个版本:1.5与3.5 最新提供:冰峰射日游戏服务端3.5版源码 让更多共同爱好决战的人研究. 说明: 本游戏服务端只供学习与参考之用,使用可能会引起纠纷,请在下载24小时内删除. 由使用者造成所有不良影响作者不承担任何责任! 本游戏服务端不带任何木马,病毒,后门等,如怕危害到您的权益,请停止下载与使用本游戏服务端. 如不是本提供下载的本游戏服务端,请勿随意下载,如到别处下载本游戏服务端危害到您的权益,请自行负责! 联系方法: 本游戏服务端程序主要开发员目前停止开发本游戏服务端,因此,以前的冰峰射日(冰风)将是过去式!-we provided a total of two versions : the latest 1.5 and 3.5 provide : the ice-day game server version 3.5 source code to enable more common love of the decisive battle research. Note : The game server is for learning and reference and use may be subject to disputes, Please download deleted within 24 hours. by all users do not adversely affect the author accept any responsibility! The game server without any kind of Trojan horse viruses, backdoors, as fear of harm to your interests, Please stop the download and use of the server-side game. If this is not available, the services side of the game, do not arbitrarily download, As elsewhere download service end of the game harm to your interests, please themselves! Contact : The game server procedures major developers now stopped development o
Platform: | Size: 316564 | Author: QiaQia | Hits:

[Other1119fjzV2.0

Description: 1、增加了安全工具三个:[木马探测器]和[可疑文件扫描器]、[木马辅助查找器], 进攻的同时也要做好防的工作; 2、小工具里面增加了一个[FLASH修改器]; 3、助手工具里面,增加了一个[IP信息群发器]; 4、攻击工具里面增加了一个[98攻击器]; 5、木马类的工具里面增加了:[配置生成杀进程工具]、[万能文件捆绑器]-an increase of security tools 3 : [Trojan detector] and [suspicious document scanners] [Trojan auxiliary locator], but also attacked the defense do the work; 2. small tool which increased by a [FLASH changes]; 3, Help tools inside. an increase in the [IP information listserv]; 4, attack tools inside an increase of [98 attacks]; 5. tools such as the Trojan horse inside the increase : [Generation scrapping process configuration tools], [omnipotent documents tied]
Platform: | Size: 7515834 | Author: xubinb | Hits:

[WEB CodeFoxHelp

Description:  不良的HTML邮件可能携带有具有破坏能力的ActiveX控制或者Script恶意代码,现在,Foxmail 6.0 能在显示HTML邮件漂亮原貌的同时,有效阻止这些控件和代码运行,从而避免自动激活附件病毒或木马,保障您的邮箱以及电脑的安全。 -bad HTML mail may have carried the destructive capacity of the ActiveX control or Scr ipt malicious code now, Foxmail 6.0 can display HTML mail beautiful marshland at the same time. effective controls to prevent and run code, thereby avoiding automatic activation Annex virus or Trojan horse, protect your mail and computer security.
Platform: | Size: 293015 | Author: peng | Hits:

[JSP/Java__________________________

Description: 有关JDBC,很好的测试辕马,大家下巴-the JDBC, very good test shaft horse. Members chin
Platform: | Size: 2499 | Author: 了解 | Hits:

[OS programjcjs

Description: Delphi写的一个进程监视程序,能实时监视进程的活动,能自动结束木马病毒进程。-Delphi process of writing a surveillance procedures, real-time process monitoring activities, can automatically process the end of Trojan horse virus.
Platform: | Size: 185380 | Author: 小鱼 | Hits:

[Other resourcexiyangqishi

Description: 有多种方法喔!西洋棋中骑士的走法与象棋的马类似,只能横向二格,纵向一格或者横向一格,纵向两格(但是西洋棋棋子必须放在格子中),第1步有2种走法,第二步就有5种走法.今有5*5的棋盘,并将骑士的第一步放于左上角(0,0)的位置,试找出一个路径,使骑士在25步内把剩下的24个位置全部走完.输出结果时,将骑士的路径显示于的5*5的方格中,每一方格内显示出走到此方格内为第同步的数字. -are many ways! Chinese chess knight of the law and take a horse like chess, only two horizontal lattice, a vertical or horizontal one lattice lattice, two vertical lattice (but chess piece must be placed on the lattice), with a further two species go, The second step will take five species law. this is a 5 * 5 chessboard, and the Knights up in the upper left corner, the first step (0, 0) position and try to find a path, Knight to make the 25-step within the remaining 24 locations completed all. Output results, Knight will be on display on the path of the 5 * 5 box, Each box shows left here for the first box synchronization figures.
Platform: | Size: 3964 | Author: tongyaozhang | Hits:

[Other resourcemumachengxu

Description: 本问是一个透视木马程序开发技术文章,给出一种通过注册服务程序,实现进程伪隐藏的方法。可供大家参考。-the question is a Trojan horse program development perspective technical articles, is a registration service procedures, process to achieve pseudo-hidden method. For your reference.
Platform: | Size: 28911 | Author: 飞马 | Hits:

[File OperateBindHider

Description: 多文件 捆绑!多文件进行捆绑,还可以进行口令加密其中有些程序(比如木马等),-multi-document bundle! Multi-document bundle can also be used for password encryption some of which (such as Trojan horse, etc.)
Platform: | Size: 67459 | Author: wbscn | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »

CodeBus www.codebus.net