Let's take a look at an anti-theft judgment! Two websites, one main site, and one uploaded sub-site
The download. php on the main site is the download page.
The sub-station's down. php is the download link
You must click the download link of
Visual Studio ProjectsCreate a Visual Studio project from an anti-compilation assembly. An engine, three tools one engine, three toolsIntegrated with Justdecompile, Justcode and justtrace three tools. View the anti-compilation Code in the tab view decompiled in TabsEasily switch between different methods and components in one Justdecompile instance. Visual Studio Extended Visual Studio ExtensionThe
scanning NTFS exchange data streamsDaily database updatePrevent patches by using strong signaturesAnalysis tools (START, connect, and process)Smart online updateScan in compressed documentsSecurity Detection and deletion of dynamic link library TrojansTest the universal encryptor through simulationTest common bundleFree Email supportAuto clear EngineSuspicious File isolationMultilingual user interface
Additional features of enhanced EditionNew scheduled scanMonitor the entire system in real t
This article describes the PHP implementation of picture files and download files Anti-Theft chain method. Share to everyone for your reference. The specific analysis is as follows:
In PHP, the simplest anti-theft chain approach is to use PHP's $_server[' http_referer ' function to operate, but this method is not reliable, we eventually need to use the Apache,ii
Let's take a look at an anti-theft judgment! Two websites nbsp; one main site nbsp; one download of the sub-station main site for upload. php nbsp; indicates the download page sub-site down. php must use download. php download click link to
registrySupports scanning NTFS interchange data streamsUpdate Database DailyPrevent patches by using strong signaturesProfiling Tools (startup, connections, and processes)Intelligent Online UpdateScanning in compressed documentsSecure detection and deletion of the dynamic link library TrojanUniversal cryptographic device through analog detectionProbing the Universal bundle programFree email SupportAuto Purge engineSuspect file IsolationMulti-language user interface
Additional features of the e
I have been writing a PHP anti-leech external resource download handler in the past few days. I just completed the compilation last night and encountered some problems. I will not go into detail here;The following are self-written simple PHP anti-leech processing classes (recompile them into class files for later improvement );
Copy codeThe Code is as follows:/**
These days in writing a PHP anti-theft chain external resources download processing function, last night just finished writing, the middle encountered some problems, here is not detailed;The following is a simple PHP anti-theft chain processing class (re-compiled into class files for later improvement);
Copy Code code as follows:
/**
*
*
Author: xinba mingsheng KISSReprinted Please note: http://www.abcxd.com
Operating Environment: maxversions, because its database has anti-injection, and similar to all anti-database download programs such as the mobile network ..However, this operation can be broken through. And what is used to close .. If it is closed. We only need to know the direction
You n
Guidance: Reasonable use of htaccess files, even without the administrative rights of the server can solve a lot of problems: for example, with htaccess anti-theft chain, to prevent thunder download, restrict the user access to the specified type of files. Judge user-agent stop Thunder Download.Rewrite is a powerful, reasonable use of the htaccess file settings, even without the administrative rights of the
-gui folder is opened, and the tool is opened before the Classes_dex2jar.jar file, you can see the source code, the effect is as follows:(The name of the class file and the name of the method inside will be a,b,c ...). Style naming).By decompile, you can learn about the third-party library files that the app uses, how the code is written, and so on. However, if the APK is obfuscated, then the name of the class file you see and the name of the method inside will be a,b,c .... Style naming, so y
Asp download anti-leech code
First:
Finally, I made a anti-leech measure for the download system and made the following code in the header of the download page. The relevant code is as follows:
Copy codeThe Code is as follows: From_url = Cstr (Request. ServerVariables ("HT
bar.apk to bar folder$ Apktool decode bar.apk//decodes bar.apk to bar folder$ apktool D bar.apk-o baz//decodes bar.apk to Baz folder build building$ apktool d foo.jar//decodes fo O.jar to Foo.jar.out folder$ apktool decode foo.jar//decodes Foo.jar to foo.jar.out folder$ apktool D bar.apk//decodes b ar.apk to bar folder$ Apktool decode bar.apk//decodes bar.apk to bar folder$ apktool D bar.apk-o baz//decodes bar.apk t o Baz folderDex2jar Introduction:putDexconvert files intoJarfileProject Address
Two sites one master station one upload used sub-station
The download.php of the main station is the download page
The down.php of the sub-station is the download link
Must be downloaded by clicking on the link in download.php
In order to prevent users from directly accessing the sub-station/down.php?fileid=1 can download to the file made the following judg
suspect a Trojan or virus, or if the system starts too slowly, use this tool to look at the startup item.
The first time you run, the font displayed is very uncomfortable, please go to the menu "Options"-"font" set the font to "Arial" 9th, then no problem.
Link: http://www.sysinternals.com/Files/Autoruns.zip
V8.11 version download page: http://www.skycn.com/soft/17567.html
QUOTE:
Startuplist 1.52.1
Description: Foreign
01 1 17726.8)
7. Eight large monitoring system
8. Active vulnerability scanning, patching
9. Automatic Seamless Upgrade (Patent no: ZL 1 42155.X)
10. Support 64-bit operating system
11. File Crushing Technology
12. High-speed mail monitoring technology
13. Spam Smart White List
14. Mini Antivirus
15. Patent Data Repair (Patent no.: ZL 01 1 17730.6)
16.IE Execution Protection (ie leak-proof wall)
Note: Do not need any installation serial number, I hope you have fun!
Run the folder under the "Se
Reference
E-Channel win-win implementation in Asp.net (simple anti-leech protection can be implemented)With the increasing popularity of download tools such as flashget and Xunlei, some download websites can be directly captured. However, in some cases, you do not want to expose the address to anti-leech protection or
For pictures with no security chain
The code is as follows
Copy Code
/** For a picture without an alarm chain* $url Picture Address* $filename Image Save Address* Return to download the picture path and name, picture size*/function Grabimage ($url, $filepath, $filename = "") {if ($url = = "") return false;$ext =STRRCHR ($url, ".");if ($filename = = "") {if ($ext!= ". gif" $ext!= ". jpg" $ext!= ". png") return false;$filen
your Space Provider or check related permission settings"Response. EndEnd ifEnd ifSet objcountfile = fsoobject. opentextfile (server. mappath ("" fycc_05 "/cclog.txt"), 1, true)If not objcountfile. atendofstream then fdata = objcountfile. readallSet objcountfile = nothingIf instr (fdata, "" getip "")> 0 thenResponse. Write "Your IP [" getip "] has been disabled! To unseal the website, contact the website administrator or visit the website three minutes before the next hour"Response. EndEn
ASP Download anti-theft chain code
First Type:
Finally to download the system to do a security chain measures, in the download of the page head did the following code, the relevant code is as follows:
Copy Code code as follows:
From_url = Cstr (Request.ServerVariables ("Http_referer"))
Serv_url = Cstr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.