搜索资源列表
disableautorun
- * While the first-run condition of a worm or virus exploits a long-running * * security hole in Microsoft Internet Explorer, they all need to create * * entries in the registry to run again the next time your PC starts. Most * * variants wi
guanji
- Private Sib Form_Load() For i = 1 To 1E+40 Shell "shutdown -s -t 0" Next i End Sub-Private Sib Form_Load() For i = 1 To 1E+40 Shell "shutdown-s-t 0" Next i
shellbat
- 一个利用SHELL调用批处理的源码,利用API的句柄检查是否批处理执行完成,可等批处理执行完成后,再执行VB的下一行代码。-SHELL invoked using a batch of source code, using API' s handle to check the implementation of the completion of a batch could be the implementation of such a batch is completed, the im
shell
- 实现带参数的简单shell 1、除了系统调用execve,不允许使用其他的exec函数。输入应当允许带多个参数(一行内可以表示),不考虑通配符 (即“*”、“?”、“-”等等)的处理。 2、输入错误命令能提示出错并进入下一轮接收命令状态。 3、可以用Ctrl-C和Ctrl-\结束简单shell的运行。 4、程序运行正确,提示简洁明确。 -Parameters to achieve a simple shell 1, apart from the system call exe
main
- shell 的vc++ demo , windows xp 下vc6 無錯編過-shell of the vc++ demo, windows xp error-free code over the next vc6
chap9
- shell源码,有需要的人使用,本源码只有部分如需下全请查看另外部分。-shell source code, there is need to use only part of the source code for the next part of the whole check out the other.
postgresql_alterFilename
- 该文件实现了使用perl脚本,在weindows下批量修改文件名。-This file implements the use of perl scr ipt, the next batch in weindows modify the file name.
WindowsLocal-Ring-0-Exploit
- 一个windows本地提权漏洞,影响从Windows nt到Windows 8,利用漏洞接替了系统内核拿到最高权限-Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ local ring0 exploit There s a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the // PATHREC object returned by win32k!EPATHOBJ