The Analysis of the Working Process and Hiding of Computer Virus and its Solutions;
计算机病毒进程隐藏分析与处理
Boolean Rule Hiding Algorithm Based on Inverted File;
基于倒排文件的布尔规则隐藏算法
Amalgamation-based digital audio information hiding method;
基于融合的数字声音隐藏方法
Today the program designers of Trojan Horse tend to use the Rootkit technique to hide their progress so as to obtain their aim.
目前木马程序设计者趋于利用rootkit技术来隐藏他们的进程,从而达到自己的目的。
This essay is to find a real Colleen Mccullough and how she wrote this book by analyzing the symptoms hide in The Thorn Birds.
麦卡洛《荆棘鸟》中隐藏的种种症候进行分析推理,并深入探究其创作心路历程。
Research on Planting Concealment and Detecting Technology of Backdoors;
后门植入、隐藏与检测技术研究
Research and Practice on Concealment technology of Kernel Trojan horse;
内核级木马隐藏技术研究与实践
Detection on Windows(2000/XP) Hidden Process;
Windows(2000/XP)下隐藏进程的检测机制
本站部份资料来自网络或由网友提供,如有问题请速与我们联系,我们将立即处理!
Copyright © 2013-2024 杭州优配网络科技有限公司 All Rights Reserved 浙ICP备20019715号
免责声明:本站非营利性站点,以方便网友为主,仅供学习。合作/投诉联系QQ:1553292129