Consider using Python to make a tricky, Trojan software, I provide ideas. (It's clear to people who have never learned programming)
1, first a hacker to do a tricky or Trojan software, will not let you can close it.
2, the inside often will be accompanied by the method of deception.
3, finally achieve a certain purpose.
A period of time in the vibrato to see an interesting program, it appears that VB is written, the first thing to use the method of deception, the use of software name deception target Click Software, opened after a label, two buttons.
The label says: I love you, do you love me?
Button: A Write love, one is not love.
What to do? The average person sees this as a direct fork off the software. However, the programmer has already written in the code window closed = False.
So there is no way, click a button to see, when the target point does not love _ button when the point is not in the mouse movement at the same time, the button is also moving. is how you can not point it, because others call the module to write the button coordinates follow the mouse movement.
No way, click on the button of love, anyway, no one knows I ordered. Well, maybe you can meet good people, you're the object. Click on the Love _ button will appear window destruction. Some people specialize in tricky, click the Love _ button immediately pop-up message box = "You are fooled Again", immediately the computer will appear the Shutdown interface (of course you can add alarm clock delay what). Someone else wrote the code that triggered the shutdown on the button.
Such a way of thinking, I have written in Python yesterday, of course, the tricky type. If you want to play a Trojan horse is not not can not, need to play some ideas, but you play is your business, I share the programming knowledge only for legitimate reference learning.
Is it nearly what? Yes, some people will open Task Manager and click the close process. So, we're going to write a Python daemon.
A Python service program starts at the command line and is controlled by the terminal (Task Manager) as a child of the terminal. If you close the sub-program for the terminal, the Python program will also close.
If you want your Python program to be unaffected by the terminal, you must turn it into a daemon.
Python implementation daemon is very simple,
Python Daemon Code:
To write the steps:
Why Fork two times?
File descriptor
Linux is "All Files", and file descriptors are indexes created by the kernel for files that have already been opened, typically non-negative integers. The process performs IO operations through file descriptors.
Umask Permission Mask
In a Linux system, any file has three usage rights for read, write, and execute (execute).
For example 754:
But Umask is in order to control the default permissions, to prevent the new file Alive folder has full authority.
Process Group
Conversation Group
The session mechanism requires shell support for work control, so the Bourne shell does not support session mechanisms.
Daemons and daemon processes
So Python daemon, for Trojan production, software and other uses is very important, of course, I do not support for illegal use, but can be used for commercial purposes, not blackmail ...
Python implementation of the whole tricky, Trojan and other hacker software!