Some time ago I watched the movie "undefeated god of war" and told about the life of the famous Carthage General hanniba. As a result of the first battle in the bucket war, manipá formed a hatred of the Roman empire since childhood under the
2007-08-16During this period of time, I am busy writing a little stuff that monitors autorun. inf. Now I have completed 90%. Maybe I can release a beta version next week ......Before that, a webpage was written to extract Suspicious File specifiers,
Recently, I wrote a travel note to Tibet on Qzone. When I edited the log on computer A, the editing page did not show the original log content, but it was blank ...... Switch to computer B and try again. Everything works. It seems that the problem
Encounter XP-664129A8.EXE
A problem occurred to a colleague's computer two days ago: The mouse could be used, but the system failed to respond and could not shut down. Please try again.
Turn off the computer power, and then turn on, enter the
People who enjoy open-source software often forget that developers who use this code mostly work in private time for free.
For some open-source projects, this is not a problem, but other projects will benefit greatly from donations. Therefore, I
Test your firewils for behavior problemsTest firewall Behavior Problems
Endurer Note: 1. Behavior problem: Behavior Problems
Blogger: Tom olzakBlog: Tom olzakTranslation:Endurer
Category: security, IT management, networking, firewallClassification:
Encounter Trojan-PSW.Win32.WOW, Trojan. psw. win32.onlinegames, Trojan. mnless. kks and so on 1
EndurerOriginal1Version
Just now, a friend called for help and said that his computer could not be connected to the Internet. Rising monitoring umbrella
(This article is copyrighted by the 20cn network security team and its authors)
I accidentally discovered this method, which is also simple. It is applicable to the automatic release format of RAR, shutdown command of Windows XP, and startup Item
Http://article.pchome.net/2003/06/21/10332.htm
Common WINXP startup faults and SolutionsAuthor: NetizensDate: 2003-06-22
1. ntldr is missing when you upgrade from Win9x to Windows XP1) problems after clone: When you want to upgrade Win9x created by
The code for automatically spreading the ARP virus Trojan. psw. win32.onlinegames
EndurerOriginal1Version
Two days ago, a netizen reported that he had recently opened a webpage with garbled characters.
Let him pass the webpage source code for
Problem
Internet Information Services (IIS) is a favorite target of hackers. thus, it's critical for administrators who manage IIS web servers to make sure that they are locked down. the default installations of IIS 4.0 and IIS 5.0 are participant
Continue to write the timed forced rest program.
The timer/countdown function uses a timer. When there are 30 seconds left for the forced rest, the countdown window is displayed in the lower right corner of the screen.
To display the countdown
Auto.exe/backdoor. win32.agent. bgu, b8u6bvx912. sys/Trojan-Downloader.Win32.Hmir.don, etc. 1
Original endurer2008-06-28 1st
Directly paste the log of pe_xscan:
Pe_xscan 08-04-26 by Purple endurer 16:58:49 Windows XP Service Pack 2 (5.1.2600) MSIE: 6
EndurerOriginal
1Version
1st websitesCode added to the homepage:/------- -------/
1. htmThe content is the VBScript code that adds extra spaces. (Rising news:Trojan. DL. vbs. Agent. r, Kaserpsky reported:Trojan-Downloader.JS.Agent.ba)
The script
Httpread 0.0.0001 beta4 written with masm32
I. Features
Read multiple web pages and download multiple network files.
It is mainly used to read malicious webpage code and download malicious program files that are spread through webpages.
II,
1.
By Greg Shultz
Takeaway: The next time you need to identify the cause of a driver problem, turn to Windows XP's little-known troubleshooting tool called the Driver Verifier manager. by going through a few short steps, you'll be able to determine
I 've been busy working and haven't written program code for a long time, but I'm happy to write a program.
I am dealing with my computer every day. When I get busy, I forget to take a rest and spend my eyes on it ~
To protect your eyes, I
2007-11-30
Continue to improve o14, o15, and o18 by referring to the information displayed by Kaka Security Assistant.
At the same time, add the coloring function in the log analysis tool to highlight malicious projects in the log,
Boboturbo.exe,100multiple svhost.exe 2
EndurerOriginal2008-04-24 th1Version
(Continued 1)
Start fixing ~Download bat_do and fileinfo to the http://purpleendurer.ys168.com.
Use fileinfo to extract the red-marked file information in the log, use
Boboturbo.exe,100multiple svhost.exe 1
EndurerOriginal2008-04-21 1st
After the boot, the system prompts multiple NSIs errors, insufficient virtual memory, and slow computer response.It's hard to open the task manager. There are more than 170
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service