Description: No matter which way the virus used, all viruses have the following basic characteristics common: 1. Search for a file infection, this document can be executable files, source code files, or anything (if not found, then Jump to the third step) 2. the virus into the body of this document 3. check did not meet the trigger conditions, if any, of this virus to activate 4. back to the host program to run or stop and return to DOS.
To Search:
- [p2psourcecode1] - A vc++ based chat program based on p2p i
- [U] - A U disk infection in the source code! S
File list (Check if you may need any files):
用C编写病毒.doc