The Analysis of the Working Process and Hiding of Computer Virus and its Solutions;
计算机病毒进程隐藏分析与处理
Boolean Rule Hiding Algorithm Based on Inverted File;
基于倒排文件的布尔规则隐藏算法
Amalgamation-based digital audio information hiding method;
基于融合的数字声音隐藏方法
Today the program designers of Trojan Horse tend to use the Rootkit technique to hide their progress so as to obtain their aim.
目前木马程序设计者趋于利用rootkit技术来隐藏他们的进程,从而达到自己的目的。
This essay is to find a real Colleen Mccullough and how she wrote this book by analyzing the symptoms hide in The Thorn Birds.
麦卡洛《荆棘鸟》中隐藏的种种症候进行分析推理,并深入探究其创作心路历程。
Research on Planting Concealment and Detecting Technology of Backdoors;
后门植入、隐藏与检测技术研究
Research and Practice on Concealment technology of Kernel Trojan horse;
内核级木马隐藏技术研究与实践
Detection on Windows(2000/XP) Hidden Process;
Windows(2000/XP)下隐藏进程的检测机制
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号