Welcome![Sign In][Sign Up]
Location:
Search - protect process

Search list

[Hook apiModLoadProtect

Description: vb源代码,利用系统的API钩子,来达到保护自己的进程,测试可用-Vb source code, using the system API hook, to protect their own process, the test is available
Platform: | Size: 3072 | Author: 张恺打 | Hits:

[Crack Hackupx-1.25

Description: 一个可以给VC++ 源代码加密的程序,(UPS),同时进行压缩,这样有利于保护你的VC源代码不被外漏,提高安全性。-One can give VC++ source code encryption process, (UPS), while compression, this will help protect your VC source code is not leakage, improve security.
Platform: | Size: 663552 | Author: lym | Hits:

[Driver Developxgy

Description: 先用应用程序设置一个受保护的文件夹,驱动启动后可以保护一个文件夹并授权一个进程可以访问。-Application settings file first with a protected folder, you can start to protect the driver in a folder and authorize a process can access.
Platform: | Size: 7824384 | Author: 赵亮 | Hits:

[Driver Developmonkey

Description: 计算机安全监控系统是一种保障信息安全的有效机制。它通过数据采集、分析处理、 规则判别、违规阻止和全程记录等过程,实现对本地或远程计算机中各类信息和用户操作的保护与监控。该文主要研究了以文件、文本和用户操作为对象的监控关键技术,通过实验对比分析了这些关键技术的实现机制与应用环境,对强化系统功能、提高监控效率和稳定性具有重要意义。-Computer security monitoring system is an effective mechanism to protect information security. It is through the data collection, analysis and processing, Rules of discrimination, illegal blocking and the whole process of recording, etc., to achieve local or remote computers all kinds of information and user protection and monitoring. This paper mainly studied with files, text, and user operation targeted monitoring of key technologies, experimental comparative analysis of these key technologies to realize the mechanism and application environment, strengthen the system function, improve monitoring efficiency and stability is important.
Platform: | Size: 312320 | Author: | Hits:

[Driver DevelopHOOKSSDTPROCESS

Description: HOOK SSDT进程保护用户层的无法关闭 -HOOK SSDT process layer to protect the user can not close
Platform: | Size: 25600 | Author: gong | Hits:

[WEB Codetgquery-index

Description: 防伪,是企业在目前社会诚信缺失、假冒伪劣商品扰乱企业正常经营和损害企业、消费者利益的情况下,为保护企业品牌、保护市场、保护广大消费者合法权益而采取的一种防范性技术措施。 企业在充分利用中选防伪技术来打击假冒伪劣、整顿和规范市场的同时,更是现代企业对外提升企业及其产品形象、展示企业对消费者、对社会负责任的一种必须手段。 同时,企业应以防伪为契机,将有效的防伪措施作为企业的一种战略投资,并有计划地制定并逐步实现防伪工作目标,并将防伪贯穿于产品生产、市场营销、企业管理的全过程,将防伪作为企业维权、打假、增效、塑造品牌的重要手段。-Security, social enterprises lack credibility in the current situation of counterfeit goods and damage to disrupt normal business enterprise, consumer interests, to protect the corporate brand, market protection, the protection of the legitimate interests of consumers and to take a preventive technique measures. Selected companies leverage technology to combat counterfeiting counterfeiting, rectify and standardize the market, it is a modern foreign enterprises to enhance corporate and product image, show business to consumer, one must be socially responsible means. Meanwhile, the enterprise should be based security as an opportunity to be an effective anti-counterfeiting measures as a strategic investment in the enterprise, and there are plans to develop and gradually achieve security objectives and security throughout the production, marketing, the whole process of business management the security as a corporate activist, counterfeiting, an important means to improve efficiency, brand
Platform: | Size: 696320 | Author: murphycao | Hits:

[OtherEqud

Description: 易语言驱动隐藏进程,保护你的进程不被游戏监测到哦,非常不错的-Easy language-driven hidden processes, protect your process is not monitored by the game Oh, very good
Platform: | Size: 283648 | Author: linddk | Hits:

[OtherEneic

Description: 易语言驱动保护进程内存,保护你的进程内存不被读写数据哦,非常不错的- Easy language driver process memory protection, protect your process memory read and write data are not Oh, very good
Platform: | Size: 433152 | Author: linddk | Hits:

[File FormatAES-project

Description: With the fast progression of data exchange in electronic way,information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access.here we design a 128 bit encoder using AES Algorithm for image encryption.-With the fast progression of data exchange in electronic way,information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access.here we design a 128 bit encoder using AES Algorithm for image encryption.
Platform: | Size: 1589248 | Author: Tejas Rai | Hits:

[Delphi VCLINetFirewall

Description: Inetfirewall aims to protect your pc from unknown connections , see the source to get more information. You can kill connections of a process , it lists every active connections on your pc and all used files (Only On or Under Windows 7 not Windows 8)
Platform: | Size: 6047744 | Author: Velxio | Hits:

[assembly languageE

Description: 1.编写一个 32 位二进制数除以 16 位二进制数的除法程序.观察当除数为 0,或 超过相应寄存器范围时,程序执行的结果. 2.修改零号中断服务程序,使它具有以下功能: (1)判断除数是否为 0,当除数为 0 时,显示相应的结果 (2)当除数不为 0 时,采用适当的方法完成商超过 16 位的二进制数的除法运算. 3.注意必须保护原有中断服务程序的入口地址,并在程序完毕前加以恢复.-1 to write a 32-bit binary number is divided by the number of 16-bit binary division process observed when the divisor is 0, or     Exceeds the corresponding register range, the result of program execution.           (2) modify the number zero interrupt service routine, it has the following features:             (1) determine whether the divisor is 0, when the divisor is 0, display the corresponding results             (2) When the divisor is not zero, using the appropriate method to complete more than 16 providers of division of binary numbers.           3 Note that you must protect the existing entry address of the interrupt service routine, and restore them before the program is completed.
Platform: | Size: 2048 | Author: 王程序 | Hits:

[Otherhacker

Description: 黑客必学_最全面的菜鸟到高手的过程,多了解黑客的知识,才能更好防护-Hackers will learn _ the most comprehensive rookie to master the process, the more knowledge of the hacker in order to better protect
Platform: | Size: 56320 | Author: LI | Hits:

[Other3253245345

Description: applications such as the scenario given above, it is required to protect the multimedia data’s privacy in the watermark detection process. Performing privacy preserving storage and secure watermark detection simultaneously is possible by using the existing secure watermark detection technologies such as zero-knowledge proof protocols
Platform: | Size: 573440 | Author: rasul | Hits:

[Othershumushengzhang

Description: 通过matlab演示了一颗小树的生长最后被乱砍乱伐的过程,提倡人们保护环境。-The MATLAB shows a small tree growth process was finally Luankanluanfa, advocate people to protect the environment.
Platform: | Size: 1024 | Author: 科研 | Hits:

[Driver DevelopEnumRemoveObCallback

Description: 对象回调是目前绝大多数游戏保护用于保护游戏进程用的回调。-Callback is a callback object is to protect the vast majority of the game to protect the game process used.
Platform: | Size: 6144 | Author: 石林 | Hits:

[androidServiceTest2

Description: Android 双进程Service常驻后台,无惧“一键清理”-Android Double process to protect
Platform: | Size: 2123776 | Author: zhang | Hits:

[Software Engineeringyyy-shumenol-wangguan

Description: 蜀门登录器网管进程保护源码,仅供网友们学习!-Shu kingdom register process to protect the source code, the network administrator
Platform: | Size: 161792 | Author: 何佳 | Hits:

[Graph programbaohu

Description: 保护源代码,可以保护你设计的程序,不被别人偷看-Protect the source code, you can protect your design process, not to be peek
Platform: | Size: 4096 | Author: mbg809559 | Hits:

[CommunicationGetSerial

Description: 软件生成注册码程序,于其它不同的是,它锁定用户的硬件,也就是针对用户的硬件生成唯一注册码,可以有效保护你的软件被盗用。不妨参考一下。-Software code generation process, on the other difference is that it locks the user s hardware, which is aimed at the user s hardware to generate the only key, you can effectively protect the unauthorized use of your software. May wish to reference.
Platform: | Size: 4096 | Author: rj590103 | Hits:

[ADO-ODBChookssdt

Description: 再谈内核及进程保护,利用hook掉系统ssdt保护进程的例子。-Return to the kernel and the process of protection, the use of SSDT hook off system to protect the process of example.
Platform: | Size: 7168 | Author: dp0857sihuanji | Hits:
« 1 2 3 4 5 67 »

CodeBus www.codebus.net