You are here: hacking technology > crack analyzes > Content
Hot Articles
Recommend Articles
New Articles
Ghost has the crack mirror image to restore needs the careful trap
  Add date: 07/17/2008   Publishing date: 07/17/2008   Hits: 71
Total 2 pages, Current page:1, Jump to page:
 

Now in the world and on-line popular each kind of WindowsXP system multi-purpose Ghost install the compact disc and the document, under uses truly is also convenient, installs a system only to need to restore the Ghost mirror image document, decorates the actuation, more than ten minutes completed absolutely. But each kind of multi-purpose Ghost edition system compact disc has the high-quality goods, also has trash, had has kept back door's trap darkly! 
First, WindowsXP multi-purpose Ghost system analysis 

When multi-purpose Ghost system manufacture, is after installing successfully deletes the Windows bringing the unnecessary document, and the deletion hardware information, then carries on the system seal. If before the installment, the maker intends some system file to replace the wooden horse back door, or turns on certain ports in the system, opens certain dangerous service, leaves behind certain spatial password account household, then manufactures the Ghost system will have each kind of security crack. After these Ghost system spreads, uses these system's user by the author control is possibly the meat chicken. 

Second, as soon as the Ghost version system common crack looks at 

1. the spatial password long-distance tabletop crack, may use the spatial password to carry on 3389 long-distance debarkations, may long-distance carry on the duty system operation. The use uses 3389 cracks to brush the Q coin, steals ADSL password account number and so on. 

2. the hideaway shares the crack, any users may visit sharing, non-default's IPC$ sharing, may discover that the sharing jurisdiction is Everyone controls completely. The use are many, the Guest group users may also format your hard disk. 

the 3.Administrator user password crack, did not much introduced. 

4. appoints the dangerous service, in the service aid may discover that many dangerous services are opened, and in the long-distance option card allows the user long-distance to connect this computer to start. 

5. the firewall has made the hands and feet, may see in the system firewall the default has not opened the permission through the project is cancelled elects. 

6. hoodlum software and back door wooden horse, secretly for customer set-up many hoodlum softwares. What is more terrorist is changes into the system file the ash pigeon wooden horse! (and the present has clone system file edition information softwares, may seem in wooden horse document camouflage semblance with system file includes equally marking size labelling and so on!) 

Third, dangerous GhostXP system edition examination 

At present known has the question edition tabulation to be as follows: 

1. tomato garden series tomato garden WindowsXPProSP2 exempts stirs up letterpress v2.8 and 2.9 as well as the new edition.   

2. rain forest wind series rain forest wind Ghost WinXP2v2.0 installing equipment version pure member version y1.7v1.85 as well as new edition.   

3. East China Sea computer company version Ghost xp_sp2 computer company special edition v4.0v4.1v5.0v5.1v5.5 as well as new edition.

 

Other pages: : 1 * 2 * Next>>
Prev:phpinfo cross station script crack Next:The FTP client side table of contents traversal crack may write the document to the optional positio

Comment:

Category: Home > crack analyzes