文件名称:bcjx(1)
- 所属分类:
- Internet/网络编程
- 资源属性:
- [Windows] [Visual C] [Basic/ASP] [源码]
- 上传时间:
- 2012-11-26
- 文件大小:
- 9.48mb
- 下载次数:
- 0次
- 提 供 者:
- l**
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
Detailed analysis of network protocols, including the tcp, udp, etc., is required reading materials, network programming
(系统自动生成,下载前可以参看下载内容)
下载文件列表
编程解析\InlineHook IoCallDriver来保护文件\bin\InstDrv.exe
........\.................................\...\ProtectFile.sys
........\.................................\bin
........\.................................\驱动源代码\makefile
........\.................................\..........\ProtectFile.C
........\.................................\..........\sources
........\.................................\驱动源代码
........\InlineHook IoCallDriver来保护文件
........\windows内核中bugcheck和shutdown回调的检测\EnumCallback.rar
........\windows内核中bugcheck和shutdown回调的检测
........\WinIo驱动级模拟按键的实现\WinIo模拟按键.rar
........\WinIo驱动级模拟按键的实现
........\函数CALL地址替换实现深度钩子\vb&vc.src\DRV\buildchk_win7_x86.log
........\............................\.........\...\buildchk_win7_x86.wrn
........\............................\.........\...\CallHook.c
........\............................\.........\...\CallHook.h
........\............................\.........\...\LDasm.h
........\............................\.........\...\makefile
........\............................\.........\...\objchk_win7_x86\i386\callhook.obj
........\............................\.........\...\...............\....\callhook.obj.oacr.root.x86chk.pft.xml
........\............................\.........\...\...............\....\CallHook.pdb
........\............................\.........\...\...............\....\CallHook.sys
........\............................\.........\...\...............\....\vc90.pdb
........\............................\.........\...\...............\....\_objects.mac
........\............................\.........\...\...............\i386
........\............................\.........\...\objchk_win7_x86
........\............................\.........\...\sources
........\............................\.........\DRV
........\............................\.........\VB\CallHook.sys
........\............................\.........\..\cls_Driver.cls
........\............................\.........\..\FrmMain.frm
........\............................\.........\..\FrmMain.frx
........\............................\.........\..\HdKillMe.exe
........\............................\.........\..\HdKillMe.vbp
........\............................\.........\..\HdKillMe.vbw
........\............................\.........\..\KillMe.vbw
........\............................\.........\..\mod_EnablePrivilege.bas
........\............................\.........\..\MSSCCPRJ.SCC
........\............................\.........\VB
........\............................\vb&vc.src
........\函数CALL地址替换实现深度钩子
........\利用CPU序列号来保护自己的软件\MD5MFC.rar
........\利用CPU序列号来保护自己的软件
........\基于SPI的网络行为监视器\源代码及程序.rar
........\基于SPI的网络行为监视器
........\....进程行为的检测技术\ProcessMointer.rar
........\基于进程行为的检测技术
........\.
........\.................................\...\ProtectFile.sys
........\.................................\bin
........\.................................\驱动源代码\makefile
........\.................................\..........\ProtectFile.C
........\.................................\..........\sources
........\.................................\驱动源代码
........\InlineHook IoCallDriver来保护文件
........\windows内核中bugcheck和shutdown回调的检测\EnumCallback.rar
........\windows内核中bugcheck和shutdown回调的检测
........\WinIo驱动级模拟按键的实现\WinIo模拟按键.rar
........\WinIo驱动级模拟按键的实现
........\函数CALL地址替换实现深度钩子\vb&vc.src\DRV\buildchk_win7_x86.log
........\............................\.........\...\buildchk_win7_x86.wrn
........\............................\.........\...\CallHook.c
........\............................\.........\...\CallHook.h
........\............................\.........\...\LDasm.h
........\............................\.........\...\makefile
........\............................\.........\...\objchk_win7_x86\i386\callhook.obj
........\............................\.........\...\...............\....\callhook.obj.oacr.root.x86chk.pft.xml
........\............................\.........\...\...............\....\CallHook.pdb
........\............................\.........\...\...............\....\CallHook.sys
........\............................\.........\...\...............\....\vc90.pdb
........\............................\.........\...\...............\....\_objects.mac
........\............................\.........\...\...............\i386
........\............................\.........\...\objchk_win7_x86
........\............................\.........\...\sources
........\............................\.........\DRV
........\............................\.........\VB\CallHook.sys
........\............................\.........\..\cls_Driver.cls
........\............................\.........\..\FrmMain.frm
........\............................\.........\..\FrmMain.frx
........\............................\.........\..\HdKillMe.exe
........\............................\.........\..\HdKillMe.vbp
........\............................\.........\..\HdKillMe.vbw
........\............................\.........\..\KillMe.vbw
........\............................\.........\..\mod_EnablePrivilege.bas
........\............................\.........\..\MSSCCPRJ.SCC
........\............................\.........\VB
........\............................\vb&vc.src
........\函数CALL地址替换实现深度钩子
........\利用CPU序列号来保护自己的软件\MD5MFC.rar
........\利用CPU序列号来保护自己的软件
........\基于SPI的网络行为监视器\源代码及程序.rar
........\基于SPI的网络行为监视器
........\....进程行为的检测技术\ProcessMointer.rar
........\基于进程行为的检测技术
........\.