Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - virus
Search - virus - List
常见的windows中出现的进程名称。非常详细,连诺顿等的常用软件的进程名都有,还包括可能的病毒进程。并且有相关操作建议。-common windows appeared name in the process. Very detailed, and even the Norton software used in the process were there, including the possibility of the virus process. Operation and relevant recommendations.
Update : 2024-05-15 Size : 774144 Publisher : 王斐

CIH病毒1.4版源代码是根据病毒的形成原理编制给大家参考-CIH virus version 1.4 source code is based on the principle of forming virus preparation for your reference
Update : 2024-05-15 Size : 9216 Publisher : 刘易

分析了一个病毒的程序,与大家分享,请赐教-analysis of a virus procedures, and to share with you, please enlighten
Update : 2024-05-15 Size : 3072 Publisher : 黄军浩

delphi usb源代码,但版本比较旧。需要Dos.pas 和,crt.pas-delphi usb source code, but version may be old, use DOS.pas and Ctt.pas
Update : 2024-05-15 Size : 14336 Publisher : 舟自横

DL : 0
★★DOS常驻内存程序[原创]★★ 也许大家不理解意思。 驻留内存的意思就是 1)不能影响其他程序的运行。 2)自我复制。 3)某种情况下进行破坏(比如4月16日)。 对于DOS程序(病毒)来说,你起码要篡改一个中断。然后在你的中断程序中把真实的中断做一次,就神不知鬼不觉了 下面我以篡改键盘中断的病毒解释一个例子。-** DOS memory Permanent procedures [original]* Perhaps they do not understand the meaning. The presence of the memory means a) should not affect the operation of other procedures. 2) self-replication. 3) under certain circumstances destruction (eg April 16). For DOS (HIV), you should at least tampered with an interruption. You then process the interruption of the actual interruption done once, without anybody knowing it, I would like a keyboard interrupt to distort the interpretation of a virus examples.
Update : 2024-05-15 Size : 4096 Publisher : 王来

基于服务方式的http代理.程序使用: BasedService8080.exe -install 安装服务 BasedService8080.exe -remove 删除服务 安装并启动服务: 步骤: BasedService8080.exe -install net start windowsmgr 附:会被杀毒软件当作病毒处理-based means of service http agent. Procedure : BasedService8080.exe-install installation services BasedService8080.exe-remove deleted service installation and start-up services : Step : BasedService8080.exe-install net start windowsmgr Attachment : antivirus software will be dealt with as virus
Update : 2024-05-15 Size : 69632 Publisher : 朱朱

截获你的应用程序,调用的,任何输入函数.rar-Catch your application, and invoke any input function.
Update : 2024-05-15 Size : 7168 Publisher :

针对二进制病毒的启发式扫描技术 很不错的毕业论文。- In view of binary virus s heuristic scanning technology very good graduation thesis.
Update : 2024-05-15 Size : 54272 Publisher : 程序员张

HAVP是一款优秀的能够扫描病毒的代理工具,你也可以设置自己的保护密码,主要用C++编写。-HAVP is a good virus can scan tool for the agent, you can also set up their own password protection, C preparation.
Update : 2024-05-15 Size : 596992 Publisher : 陆红

搜索硬盘中的特殊文件,如*.tmp文件,可以用来搜索中病毒后的特殊文件,类似于Windows中的搜索功能-search drives the special documents, such as*. tmp files that can be used to search the virus after the special paper, similar to the Windows search function
Update : 2024-05-15 Size : 135168 Publisher : 蔡毅

java程序设计教程,是电子版的。没有病毒,请放心下载。你们的朋友:42274350-java programming guides, is the electronic version. No virus, please rest assured download. Your friend : 42274350
Update : 2024-05-15 Size : 2099200 Publisher : 杨小强

DL : 0
一种病毒的源码,熟悉之后就可以针对这种病毒写出破解程序.-a source of the virus, after the familiar against the virus can write crack procedures.
Update : 2024-05-15 Size : 1468416 Publisher : 周苗

Kylinx 2003 病毒源程序-Kylinx 2003 virus source
Update : 2024-05-15 Size : 4096 Publisher : 杜在有

第三方执行代码侵入方法,常用于病毒/反病毒技术。即在一个已编译完成的PC可执行代码中嵌入自己的可执行代码,并不干扰原程序。侵入级别在物理代码地址级别,低与Rin3级。有很强的攻击性。-third-party code execution invasive method, commonly used in HIV/anti-virus technology. That is compiled in a complete PC executable code embedded in the executable code, does not interfere with the original procedure. Invasive- level code addresses the physical level, with low-level Rin3. A strong offensive.
Update : 2024-05-15 Size : 80896 Publisher : Luther.luo

病毒制造机源码,有兴趣的朋友可以看一下-Virus source machine, interested friends can look at
Update : 2024-05-15 Size : 274432 Publisher : fan

DL : 0
Rootkit,用来隐藏进程, 是从系统底层彻底隐藏哦(用process32frist等看不到)。 原本出自www.rootkit.com 我把他修改抽象出了一个hideme函数。 只要在程序中调用就可以了。 另外需要一个sys的支持,我放进来了。 但可能会被某些杀毒软件以为是病毒哦!-Rootkit, to hide the process from the system is completely hidden Oh bottom (using other process32frist see). Originally from www.rootkit.com I put him to revise the abstract hideme out of a function. As long as the procedure call on it. Also needs a sys support, I put up. It might be thought that some antivirus software is a virus!
Update : 2024-05-15 Size : 6144 Publisher : 胡俊杰

本资源由源码天空(Codesky.net,以下简称本站)搜集 ║  ║ 整理,本站不承担任何技术及版权问题。在本站下载 ║ ║ 任何资源仅提供学习参考,不得用于商业用途,请在 ║ ║ 下载后24小时内删除。本站不保证资源的完整性和是 ║ ║ 否隐含病毒,请自行调试及杀毒,如不同意本条款请 ║ ║ 勿使用,谢谢合作!-source of the resources from the sky (Codesky.net, hereinafter referred to site) to collect collate site not bear any technical and copyright issues. The site downloaded any resources for learning reference only, not for commercial use, please download within 24 hours after the deletion. Site does not guarantee the integrity of the resource and is not implied virus, antivirus and debug their own, do not agree with this article please not use, Thank you for your cooperation!
Update : 2024-05-15 Size : 17408 Publisher : mc

DL : 0
qq病毒的基本实现方法,qq病毒使用查找窗口方式实现粘贴复制,-qq the basic realization of the virus, the virus used to search qq window means pasting copying,
Update : 2024-05-15 Size : 8192 Publisher : 大幅缩

DL : 0
现在的病毒是越来越多了,几乎每上一回电脑都要杀毒,所以杀毒软件是必不可少的-the virus is now more and more, almost every last one to have antivirus computer, antivirus software is essential
Update : 2024-05-15 Size : 1041408 Publisher : 盛唯佳

DL : 0
lights个人曾经最骄傲的程序 VB也疯狂,自己生成自己,病毒? 病毒是在程序中加入额外的代码来完成自己的使命。 这个程序是在程序中加入额外的程序。-lights got most proud of VB procedures are crazy, and their own generation, the virus? The virus is the process by adding additional code to complete their mission. The procedure is in the process of adding additional procedures.
Update : 2024-05-15 Size : 2048 Publisher : 李剑英
« 1 2 ... 41 42 43 44 45 4647 48 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.