Welcome![Sign In][Sign Up]
Location:
Search - viruses

Search list

[Develop Tools安全防线

Description: 精华BBS贴子,是关于计算机安全防线的一些经验,心得,相信会对电脑爱好者,尤其受病毒、黑客困扰的人会有所帮助的-essence BBS posting is on the line of computer security some of the experiences gained, I believe it computer enthusiasts, particularly by viruses, hackers disturbed person will help!
Platform: | Size: 8941489 | Author: 王兆 | Hits:

[Firewall-Securitycpav

Description: 月光通用杀毒系统的源代码,用于清除未知病毒.zip-moonlight common antivirus system source code for the removal of unknown viruses. Zip
Platform: | Size: 40921 | Author: 123 | Hits:

[GUI Developsnatl

Description: 网络嗅探器sniffer,用来网络抓包,没有密码,没病毒,请放心下载-Sniffer network sniffers, used for capturing Packet networks, no password, no viruses, please rest assured Download
Platform: | Size: 71943 | Author: 陈庆智 | Hits:

[Hook apiHookSrc

Description: API calls interception is the task that allows you to get access to some parts of others programs. Lots of programmers spend time developing and describing various methods that allow that access. Such methods are used in many anti-virus and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I spent much time finding and understanding the technique of interception. I would like to describe the results of my research.-API calls interception is the task that all boasting you to get access to some parts of others prog rams. Lots of programmers spend time developin g and describing various methods that allow tha t access. Such methods are used in many anti-vir us and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I s pent much time finding and understanding the te TECHNIQUE of interception. I would like to descri be the results of my research.
Platform: | Size: 19839 | Author: 李登煇 | Hits:

[File OperateSplitExe

Description: 检测EXE文件是否被捆绑了其他程序,在一定程度上防止病毒、木马!-detection EXE files can be bundled with other procedures, to a certain extent, prevent viruses, Trojan!
Platform: | Size: 9538 | Author: 张宇 | Hits:

[Othersreng21

Description: 一个杀毒的软件,专门杀netsend.exe.tmp之类的电脑病毒,对那些连好的杀毒软件没也没有办法的病毒能有效解决-an antivirus software, specialized scrapping netsend.exe.tmp like computer viruses, even for those not good antivirus software are not the virus can effectively solve
Platform: | Size: 414896 | Author: 莉莉 | Hits:

[ActiveX/DCOM/ATLcomputer-viruses-from-theory

Description: computer-viruses-from-theory-to-applications这是一本关于计算机病毒的书。
Platform: | Size: 2389955 | Author: 李涛 | Hits:

[OtherSteath Bomber_Source For AntiVirus Utility

Description: Stealth Bomber is an ti-virus utility. It performs simple checks by looking for suspicious behaviour in the operating system and checks files with one of the most effective weapons against computer viruses: the Cyclic Redundancy Check, or CRC
Platform: | Size: 53248 | Author: 林菁明 | Hits:

[File OperateViruses

Description: 这里有很多的virus code绝对经典,不经典不发,这里有先进的技术,-here have a lot of virus code absolute classics, not the classics, where advanced technology,
Platform: | Size: 588800 | Author: xinwanjiang | Hits:

[Otherviruses

Description:
Platform: | Size: 314368 | Author: rj | Hits:

[ActiveX/DCOM/ATLcomputer-viruses-from-theory

Description: computer-viruses-from-theory-to-applications这是一本关于计算机病毒的书。-computer-viruses-from-theory-to-applications this is a book on computer viruses.
Platform: | Size: 2390016 | Author: 李涛 | Hits:

[Internet-Network1223

Description: C语言实现病毒源码 当含有病毒部分的程序被执行时,首先进入病毒程序。它在磁盘上找扩展名为C的匹配文件,如果找到,查找是否有被传染过的标志“INFECTED”。如果有此标志,继续找其它的C文件,直至全部检查一遍。若没有这个标志,则 (1)在未被感染的C程序头部加入“INFECTED”已被传染标志。 (2)读取病毒文件的头文件,将其插入到即将被感染的文件头部。如果发现有重复则不插入。 (3)在主程序中插入“VIRUSES();”调用VIRUSES函数。寻找printf、for、while、break语句,如果找到就在之前插入。 (4)在文件尾部插入VIRUSES_SUB子程序。 (5)在插入到将感染文件里面的VIRUSES_SUB子程序里面,必须把文件名改为当前自身的文件名,否则被传染后的文件经过编译、连接和运行后不能再继续传染。 (6)最后插入VIRUSES子程序。这个子程序里面调用了VIRUSES_SUB,执行到这里返回执行结果信息。 -C language implementation demonstration virus source
Platform: | Size: 150528 | Author: 马科 | Hits:

[OtherDSSOURCE.ZIP

Description: More than 800 virus code (old school) just for fun and studying prehistoric viruses. WARNING: use it at your own risk
Platform: | Size: 2390016 | Author: DelphiCoder | Hits:

[Windows Developviruses

Description: 系统维护手册,特别是病毒方面很让人头疼,这本病毒维护手册将助你一臂之力!-System maintenance manuals, in particular, viruses are very people a headache, this virus maintenance manual will help you!
Platform: | Size: 591872 | Author: 云波 | Hits:

[OtherEvolution-Of-Computer-Viruses-History-Of-Viruses.

Description: 7 Parts document. Evolution Of Computer Viruses History Of Viruses.
Platform: | Size: 8192 | Author: realahmed8 | Hits:

[OS programBAT-Write-viruses-tutorial

Description: BAT写病毒教程,以前别人发个我的,有意思的下来-BAT write viruses tutorial, before others send a my and fun to look down
Platform: | Size: 36864 | Author: 田海 | Hits:

[OtherComputer-Viruses-for-DUMmIES

Description: This a book about computer viruses for DUmmies.Very good to learn.-This is a book about computer viruses for DUmmies.Very good to learn.
Platform: | Size: 3125248 | Author: houseinn2 | Hits:

[Software EngineeringThe-Giant-Black-Book-of-Computer-Viruses

Description: Book about programming viruses and low-level stu-Book about programming viruses and low-level stuff
Platform: | Size: 4932608 | Author: black | Hits:

[Industry researchDetection-of-viruses-in-tomatoes-leaf-based-on-K-

Description: Detection of viruses in tomatoes leaf based on K-Mean clustering algorithm
Platform: | Size: 4571136 | Author: mokhtar | Hits:

[OtherWireless-Technologies-and-Computer-Viruses

Description: Wireless Technologies and Computer Viruses
Platform: | Size: 349184 | Author: he123354 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 18 »

CodeBus www.codebus.net