Welcome![Sign In][Sign Up]
Location:
Search - malware

Search list

[Otherzhuanti

Description: 反病毒、反间谍软件(木马)专题为了让大家对计算机病毒及其产生的危害有更多了解,具备基本的反病毒知识,我们特制作了这期反病毒、反流氓软件专题-anti-virus, Anti-spyware (malware) in order for the topic of computer viruses and the harm is more understanding, have basic anti-virus knowledge, we made a special edition of anti-virus and anti- rogue software feature
Platform: | Size: 8192 | Author: 付联榕 | Hits:

[Education soft systemmalware

Description: 恶意代码机理与防范技术研究,一篇非常好的博士毕业论文,对于恶意代码讲解全面而有深度,对于恶意代码研究很有帮助,.nh格式,使用CAJViewer打开-Mechanism and prevention of malicious code technology research, a very good Ph.D. thesis, for malicious code on a comprehensive and deep, very helpful for the study of malicious code,. Nh format, the use of open CAJViewer
Platform: | Size: 6408192 | Author: wn | Hits:

[Othermalware

Description: 武汉大学恶意代码课程资料 (全国最好的信息安全专业课程)
Platform: | Size: 3234816 | Author: van | Hits:

[Sniffer Package captureESCAN

Description: ESCAN源代码 ESCAN是一个完全设计和研发来保护个人计算机免于各类威胁(像是病毒、间谍软件、广告软件、恶意软件、按键记录程序、黑客程序、垃圾邮件软件、隐私权问题、令人厌恶的内容..等等)的专业软件-Escan Escan source code is a completely designed and developed to protect personal computers from all types of threats (such as viruses, spyware, adware, malware, keyloggers, hackers program, spam software, privacy issues, it is Offensive content .. etc.) the professional software
Platform: | Size: 359424 | Author: yingzs04 | Hits:

[Othermalware

Description: 计算机病毒与木马缝隙的书,是一本分析病毒数据及程序结构的好书籍-Computer viruses and Trojan horses book gap is an analysis of HIV data and program structure of a good book
Platform: | Size: 6991872 | Author: 20070303 | Hits:

[DocumentsMalware

Description: 计算机病毒讲座,英文的,一个老外讲的,很好的资料。-Computer viruses lectures, in English, a foreign-speaking, and good information.
Platform: | Size: 19456 | Author: 胡锦涛 | Hits:

[WEB CodeASProxy

Description: spy proxy is an agent based detection of malicious web content it protect the users from internet borne malware
Platform: | Size: 309248 | Author: mehala | Hits:

[assembly languageameagle

Description: These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very hard to find them now adays..these are extremely helpfull for people working in Malware analysis and malicious code analysis
Platform: | Size: 1218560 | Author: asif | Hits:

[VC/MFCinside_windows_rootkits

Description: 见包名字就知道是什么了哦,对ENG好的人来说就是好东西-Although they have been around for quite some time, rootkits have become somewhat of a buzzword in the security industry over the past year. While rootkits have traditionally been used by sophisticated attackers to hide their presence on compromised machines, recent worms, viruses, and trojans have started using them to complicate efforts to detect and clean infected machines. Microsoft recently reported that over twenty percent of the malware found by their malicious code removal tool on Windows XP Service Pack 2 machines contained rootkit technology [1]. By hiding the infection, rootkits allow the malicious software to remain on the system for a longer period of time. This enables the malicious software to steal more information, send out more spam, launch more DDOS attacks, and ultimately make more money for whoever is controlling it. Even some commercial software has adopted techniques used by rootkits for protection. The most famous example of this is the Sony Digital Ri
Platform: | Size: 691200 | Author: fdef | Hits:

[Special Effects5_Malware_Analysis_Detection

Description: A Book About Malware
Platform: | Size: 326656 | Author: 李想 | Hits:

[Windows DevelopMalware

Description: 恶意程序源代码,让c_time 崩溃,使系统无限注销,仅用于学习-A malware sourcecode,only for study
Platform: | Size: 29696 | Author: leeyun | Hits:

[Delphi VCL200761112104291

Description: 根据tommsoft提供的恶意软件清理工具提供的开发包,汉化整理而成,由于上次失误,没有发源代码,特重新发出! -According to tommsoft malware provided by the development of clean-up tool bag, finished order made that since the previous errors, there is no origin code, special re-issue!
Platform: | Size: 526336 | Author: laozuo007 | Hits:

[Windows Developscan_malware_tool_2.0

Description: search file list and view malware database
Platform: | Size: 986112 | Author: icelon | Hits:

[OS program20104141531383

Description: 流氓软件扫面与清除源码 运行平台: Windows -Malware scanning and removal source operating platforms: Windows
Platform: | Size: 186368 | Author: zhengjie123 | Hits:

[OtherMalware

Description: 1- Malware is an abbreviation of malicious software which includes Trojans, viruses, worms, 2- Virus properties: a. Code portion that requires a host software (it infects other software and live on them) b. Requires a trigger (human action execution) to activate them. c. Has three main tasks: hiding, infection, damage (or job) d. It can change it’s shape/behavior to evade antiviruses.
Platform: | Size: 13312 | Author: mhdjamal | Hits:

[OtherReverseEngineeringCodewithIDAPro

Description: Reverse Engineering Code with IDA Pro IDA Pro 是一个世界顶级的交互式反汇编工具,它的使用者囊括了软件安全专家,军事工业,国家安全信息部门,逆向工程学者,黑客。从功能上它大大胜过了w32dasm。近来它的盗版已经在网上传播开了,你可以很轻松得到它。 -IDA is one of the most popular debugging tools for Windows. First, IDA Pro is a disassembler, in that it shows the assembly code of a binary. It also comes with advanced features that try to make understanding the assembly code as easy as possible. Second, it is also a debugger, in that it allows the user to step through the binary file to determine the actual instructions being executed, and the sequence in which the execution occurs. IDA Pro is widely used for malware analysis and software vulnerability research, among other purposes.
Platform: | Size: 3752960 | Author: huangkeqiang | Hits:

[OtherMobile.Application.Security.McGraw.Hill.2010-1

Description: This book is divided into two parts, with the first being “Mobile Application Platforms” (Chapters 2 through 8). These chapters discuss the major operating system platforms on mobile devices, including Google’s Android, Apple’s iPhone, Windows Mobile, RIM BlackBerry, J2ME, and Symbian. These chapters strictly discuss how to use the platforms to build secure applications. For example, they address many of the items in the top 15 list discussed in Chapter 1, including secure storage, application isolation, and malware threads. These chapters should be considered a “how-to” guide for application developers who are interested in leveraging the security models of each platform.
Platform: | Size: 3871744 | Author: guosong | Hits:

[OS program007

Description: 随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、木马、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。 研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data. Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
Platform: | Size: 2985984 | Author: ZYM | Hits:

[OS programMyKill

Description: 自己写得木马转移程序。自动查找Malware.QVM14.GEN木马,并把它转移到E:\bak目录下。-Trojan shift their written procedures. Automatically find Malware.QVM14.GEN Trojans, and to transfer it to E: \ bak directory.
Platform: | Size: 13312 | Author: 特殊台 | Hits:

[Windows Developanatomy-of-stealth-malware

Description: Anatomy of Stealt Malware, very good
Platform: | Size: 235520 | Author: MUTANT | Hits:
« 12 3 4 5 6 »

CodeBus www.codebus.net