You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
How does the hacker destroy kills the poisonous software(2)
  Add date: 07/08/2008   Publishing date: 07/08/2008   Hits: 65
Total 2 pages, Current page:2, Jump to page:
 

  Then carries on adds shell processing, like this may prevent the source code which and the condition code will kill the poisonous software to gain carries on rightly compared. Moves Private exe the Protector this section of Canada shell procedure, in presents the hacker procedure which “the application procedure” in the tabulation the establishment needs to exempt kills. Under “the establishment” in the option “the dynamic protection” will cancel again elects, finally clicks on the toolbar “to start to protect” the button then immediately to carry on adds shell processing.

  Fourth, changes the entrypoint against condition code contrast

  Finally carries on the change entrypoint processing, its goal and adds shell processing to be similar, is lets kill the poisonous software to be unable from the hacker procedure entrypoint to gain the source code. Moves the PEditor this model of software fix procedure, the click “the browsing” the button chooses the hacker procedure, found “the entrypoint” this information option, then added on in the original value's foundation 1, then clicked the button may complete a moment ago establishment confirmation “using the change”.

  After the hacker procedure carries on exempts kills processing, must first use many patterns to kill the poisonous software to carry on kills the poisonous examination, does not have the installment to kill the poisonous software the user also to be possible to look up the poisonous website through more than an engine sample to carry on the examination.

  If were already not killed poisonous software institute Zha Sha, but must after local tests the process to exempt kills processing the procedure whether can the normal movement. Only then after having carried on this a series of tests, can determine whether this hacker procedure does exempt kills successfully.



 
Other pages: : <<Prev * 1 * 2
Next:The SQL injection revises difficultly to guess the solution MD5

Comment:

Category: Home > hacker course