Description: several hacker procedures source description : a remote host* disk directory and file browser, and download, remote execution. 2* provide three forms of connectivity :* Udp single packet rapid interactive catalog browsing, Udp* TCP packets into reverse connect* Conventional TCP active connector. 3* Screen View-screen or continuous monitoring, since the definition of image quality (1-100), while mouse and keyboard control. 4* Easy search and process management : IP address and port combination with the range of scanning, can be found on the remote host running process, and arbitrary termination of its .5* Deputy control services framework : program structure can be constructed more than 100 computers and multi-node agents, relay the goal of computer transmission of information packe
- [anti-hacker tool] - A simple network firewall source code
- [IEFilter] - control ie Object com website and conten
- [ApacehAntManual-chm] - ant tool use, chm files accessible
- [HideProc] - 2000/XP hidden in the process, articulat
- [peeper] - peeping, client-server, mainly long-rang
- [ProcessToPort] - ports and a process linked to the proced
- [firewall1] - a small firewall packet filtering code t
- [pfw] - main function is as follows : 1 : Ports
- [remoteCtrl123] - Screen Monitor, the use of TCP can monit
File list (Check if you may need any files):