Description: Content arrangement: 1. The original socket socket to introduce the work of the original 1.1 Principle and Application of Rules 1.2 Simple 2 FTP password theft Implementation (simple rootkit) 2.1 Design 2.2 to achieve less than 2.3 and the improvements
File list (Check if you may need any files):