Welcome![Sign In][Sign Up]
Location:
Search - hide

Search list

[Firewall-SecurityDCT域隐藏

Description: 当要隐藏信息时,在MATLAB的命令窗内输入命令: hide = myhide(carry,signal,x,y); carry 用你的原始载体文件名代替,signal 用你所要隐藏的文件名代替 carry 和 signal 都必须是 *.* 的形式(注意不能省略单引号) x,y 是选取隐藏信息的位置坐标,在(x,y)和(y,x)处 生成的伪装载体文件名为hide.bmp 注意myhide.m文件,载体文件,隐藏文件都要在当前目录(current Directory)下 当要提取信息时,在MATLAB命令窗内输入命令: behidden = myinhide(carry,x,y); carry 用你的伪装载体文件名代替,格式为 *.* (注意不要丢掉单引号) x,y 是选取隐藏信息的位置坐标,在(x,y)和(y,x)处,这必须和嵌入时所选位置一致。 提取出的信息文件名为behidden.bmp 同样,要注意behidden.m和伪装载体文件都要在当前目录(current Directory)下-when to hide information, in order MATLAB within a window orders : hide = myhide (carry, signal, x, y); Carry with you the original document name instead vector, signal used to hide your name in the paper and instead carry signal must be in the form of*.* ( not to single quotes omitted) x, y is to select the location of hidden information coordinates (x, y) and (y, x) The formation of camouflage vector document, entitled hide.bmp attention myhide.m documents, vector documents hidden all the documents in the current directory (current Directory) to retrieve information when, in order window MATLAB import order : behidden = myinhide (carry, x, y); carry using your camouflage vector file name instead, the format for*.* (take care not to lose a single quote) x, y election Hiding information
Platform: | Size: 203776 | Author: 韩飞 | Hits:

[OS program20050906Hide

Description: 本程序能关机,重启,注销,锁定,隐藏任务栏的功能.-shutdown and restart, canceled, lock, hide task bar function.
Platform: | Size: 935936 | Author: 小王 | Hits:

[OS programhideme

Description: Rootkit,用来隐藏进程, 是从系统底层彻底隐藏哦(用process32frist等看不到)。 原本出自www.rootkit.com 我把他修改抽象出了一个hideme函数。 只要在程序中调用就可以了。 另外需要一个sys的支持,我放进来了。 但可能会被某些杀毒软件以为是病毒哦!-Rootkit, to hide the process from the system is completely hidden Oh bottom (using other process32frist see). Originally from www.rootkit.com I put him to revise the abstract hideme out of a function. As long as the procedure call on it. Also needs a sys support, I put up. It might be thought that some antivirus software is a virus!
Platform: | Size: 6144 | Author: 胡俊杰 | Hits:

[OS programAFXRootkit2005

Description: 一个用delphi开发的开源rootkit代码,可以隐藏文件,目录,进程,句柄等信息。-used to develop an open-source code rootkit can hide files, directories, processes, handle such information.
Platform: | Size: 247808 | Author: 杨树 | Hits:

[Windows DevelopDT修改_xp下隐藏进程VC6

Description: WindowsXP下隐藏自己的进程,使用非常方便,只需要在本进程内调用此函数!千万不要用来写“流氓软件”!-WindowsXP hide under the process is extremely easy to use, only in this process calling this function! Do not write to "rogue software."
Platform: | Size: 2048 | Author: | Hits:

[assembly languageInvisibility

Description: This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used as some kind of dump protection. The way to get this done is very different on NT and 9x machines. -This is an example how one could hide a Proce ss based on Windows operation systems from task viewers like ProcDump (G-RoM Lorian
Platform: | Size: 38912 | Author: gogo | Hits:

[Firewall-Securityhdsk41

Description: hide and seek 可以在GIF图像中嵌入数据。-hide and seek in the GIF image embedded data.
Platform: | Size: 214016 | Author: 杨琴 | Hits:

[Hook apiDetection_of_the_hidden_processes

Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: | Size: 15360 | Author: inwing | Hits:

[Internet-Networkkhs

Description: 一个小程序,用于Kill Hide Services,即找到隐藏的服务并清除掉。C/C++编写-a small program for Kill Hide Services, that is, to find the hidden services and cleared. C/C preparation
Platform: | Size: 5120 | Author: zhang | Hits:

[Process-ThreadHideProcessFORXP2000

Description: 在2000和xp下,隐藏进程,VC6.0测试通过 在需要隐藏进程的时候#incoude"HideProcess.h",调用HideProcess()即可。-in 2000 and xp, hidden process, VC6.0 tested in the process need to hide when# incoude "HideProcess.h" Call HideProcess () can be.
Platform: | Size: 3072 | Author: | Hits:

[Internet-Networkudpattack

Description: 远程反弹木马软件 主要功能:1、远程文件访问。包括文件上传、下载、文件。(夹)更名、文件删除、文件运行、文件查找、远程创建文件夹、远程清空文件夹等。  2、远程关机、启动、注销、修改组织名、用户名。  3、远程键盘记录、鼠标控制、锁定键盘鼠标、模拟特别键功能。  4、远程注册表模拟器、快速注册表修改。  5、远程消息发送、远程进程控制。  6、远程查看剪贴板、当前活动窗体名、隐藏桌面图标、隐藏任务栏、隐藏开始按钮等。  7、远程系统命令、远程DOS命令。  8、远程屏幕抓图(可保存为图片)。  9、服务端自定义配置。可自行定义IP地址、连接端口、连接密码。   您可以根据自己的需要对该程序进行任意改 * 注意:严禁用本软件进行非法使用,否则后果自行负责,作者概不对使用此软件造成的一切后果负责!!! -Remote rebound Trojan software major functions : 1, remote file access. Including file upload and download documents. (SCH) renamed, deleted files, documents operation, document search, remote folder creation, distance to empty the folder, and so on. 2, remote shutdown, the launch, cancellation, change organizations, user name. 3, remote keyboard records, mouse control, lock keyboard and mouse to simulate the special function keys. 4, remote registry simulator, rapid changes registry. 5, remote messaging, remote process control. 6, remote View clipboard, current activities Form, and hide desktop icons, hide task bar, Start button, and other hidden. 7, remote system commands, remote DOS command. 8, remote screen From Wikipedia (saved as pictures). 9, since the definition of the server confi
Platform: | Size: 606208 | Author: 林封 | Hits:

[Process-Thread235634645

Description: 隐藏自身进程,利用部分设备驱动原理,在win2000,xp,2003上通过,不支持9X-hide their own processes, the use of some device driver for the WIN2000, xp, 2003, adopted X does not support 9
Platform: | Size: 6144 | Author: jacky | Hits:

[CA authStegano

Description: steganography tools to hide a text file in an image in true colour.-steganography tools to hide a text file in a n image in true color.
Platform: | Size: 172032 | Author: | Hits:

[OS programeasyshell

Description: 不错的后门代码,用了一些驱动技术来隐藏进程,隐藏注册表,希望对大家有所帮助-good backdoor code, used some technology-driven process to conceal, hide the registry, and I hope to help everyone
Platform: | Size: 271360 | Author: 李大叶 | Hits:

[OS programtruecryptsc

Description: 文件程序驱动 可以用来隐藏文件系统的有关细节-paper-driven process can be used to hide the file system on the details
Platform: | Size: 1160192 | Author: 梁公子 | Hits:

[OtherHideWindow123

Description: its a useful code. Use this to hide MFC window. when your window code don t want to show other users. -its a useful code. Use this to hide MFC windo w. when your window code do not want to show other u sers.
Platform: | Size: 34816 | Author: 郭迎祥 | Hits:

[AI-NN-PRmatlab_hmm

Description: hide markov model(HMM) for matlab including initiate,train,and test three parts -hide markov model (HMM) for Matlab includi Vi initiate, train, and test three parts
Platform: | Size: 131072 | Author: Tianliang Liu | Hits:

[Crack HackEncrypt

Description: What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
Platform: | Size: 9216 | Author: 刘博 | Hits:

[OS programhideprocess

Description: 驱动级的隐藏进程代码,在驱动层通过替换ssdt地址表中的函数来隐藏进程-Driver-class to hide the process of code, in the driver layer SSDT address table by replacing the function to hide the process of
Platform: | Size: 135168 | Author: 俞健 | Hits:

[Hook apihide

Description: Windows XP系统中如何屏蔽 Ctrl+Alt+Del、Alt+Tab以及Ctrl+Esc键序列
Platform: | Size: 99328 | Author: jerry | Hits:
« 1 23 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net