下载 >  安全技术 >  网络攻防 > Trojans Worms
2

Trojans Worms

木马和蠕虫资料 学习病毒者,极力推荐阅读 此书是英文的
2009-06-11 上传大小:605KB
分享
收藏 举报

评论 共1条

control520 东西一般,还是谢谢楼主
2012-12-15
回复
worms

worm exist

立即下载
Detecting Internet worms at early stage

Detecting Internet worms at early stage

立即下载
Worms clone game

Worms clone game. Developed in C++, using SDL as graphics/events library. Licence: Zlib. Game supports a simple shooting weapon and "ninja cord". If you have any doubt please contact me.

立即下载
诺基亚N-gage游戏,百战天虫破解版Worms

诺基亚N-gage游戏,百战天虫破解版Worms 完美破解版 放入N-GAGE目录即可

立即下载
Recent Worms A Survey and Trends

This paper is meant to provide worm researchers with a high-level roadmap to the vast body of virus and worm information. After sifting through hundreds of entries, we present only those that we considered breakthrough or novel, primarily from a technical perspective. As a result, we found ourselves omitting some of the most notorious worms simply because they lacked any original aspects. It is our hope that others in the community who need to get up to speed in the worm literature can benefit from this survey. While this study does not contain any original research, it provides an overview of worms using a truly breadth-first approach, which has been lacking in the existing worm literature.

立即下载
CROSS-SITE SCRIPTING WORMS AND VIRUSES The Impending Threat and the Best Defense

英文版 10 Quick Facts About XSS Viruses and Worms" 5 An Overview of Cross-Site Scripting (XSS)" 6 Non-Persistent" 6 Persistent" 9 How They Do It: Methods of Propagation" 10

立即下载
Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation

Computer worms evolved continually, faster and smarter. Proactive P2P worms with new “gene” propagate over logical P2P overlay networks defined by peer relationship. Observations suggest that the node degrees of an unstructured P2P network are power law distributed thus we model it as a power law undirected graph. We study propagation process of proactive P2P worm using a dynamic epidemic model. Specifically, we adopt discrete-time to conduct recursive analysis and deterministic approximation to describe propagation of proactive P2P worm. Then we carry out extensive simulation studies, which prove that the mathematical model matches simulation results well.

立即下载
Malware Analyst's Cookbook

Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.

立即下载
A-LIST.Shellcoder's Programming Uncovered.chm

Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether. <br/>

立即下载
On-chip Structures and Techniques to Improve the Security

Due to the globalization of the semiconductor design and fabrication process, inte- grated circuits (ICs) are becoming increasingly vulnerable to malicious activities. There are two major problems that impact the security, trustworthiness, and relia- bility of ICs used in military, financial, or other critical applications: (i) Malicious inclusions and alterations, known as hardware Trojans, could be easily inserted into intellectual properties (IPs) or ICs by an untrusted process.

立即下载
Reflections on Trusting Trust-Thompson PDF

Ken Thompson著作 Reprinted from Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. Copyright © 1984, Association for Computing Machinery, Inc. Also appears in ACM Turing Award Lectures: The First Twenty Years 1965-1985 Copyright © 1987 by the ACM press and Computers Under Attack: Intruders, Worms, and Viruses Copyright © 1990 by the ACM press.

立即下载
ProcessGuardV3.410

DiamondCS ProcessGuard是一款系统安全程序,它通过一个安全地控制进程到进程访问的核心模式来保护Windows进程免受其它进程,服务,驱动程序,以及系统上的其它形式的可执行代码的攻击。ProcessGuard还能够停止未被用户许可的程序运行,停止在后台静静运行的恶意蠕虫和trojans,也包括许多其它攻击,ProcessGuard甚至可以停止击键记录程序和leaktest。

立即下载
Active Ports

Active Ports - easy to use tool that enables you to monitor all open TCP/IP and UDP ports on the local computer. Active Ports maps ports to the owning application so you can watch which process has opened which port. It also displays a local and remote IP address for each connection and allows you to terminate the owning process. Active Ports can help you to detect trojans and other malicious programs.

立即下载
端口监测工具--aports

很不错的端口监测工具,Active Ports - easy to use tool that enables you to monitor all open TCP/IP and UDP ports on the local computer. Active Ports maps ports to the owning application so you can watch which process has opened which port. It also displays a local and remote IP address for each connection and allows you to terminate the owning process. Active Ports can help you to detect trojans and other malicious programs.

立即下载
Reverse Engineering Malware

This document discusses tools and techniques useful for understanding inner workings of malware such as viruses, worms, and trojans. We describe an approach to setting up inexpensive and flexible laboratory environment using virtual workstation software such as VMware, and demonstrate the process of reverse engineering a trojan using a range of system monitoring tools in conjunction with a disassembler and a debugger. Portions of this document are based on the paper that we submitted to GIAC as part of a practical assignment for obtaining a GCIH Certification.

立即下载
McAfee VirusScan Enterprise

Overview McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software. It also extends coverage to new security risks and reduces the cost of responding to outbreaks with the industry’s lowest impact on system performance. With VirusScan Enterprise, you get: Maximum defense against malware — Safeguards your systems and files from viruses, spyware, worms, Trojans, and other security risks. It detects and cleans malware, and allows you to easily configure policies to manage quarantined items. Proactive protection from attacks — Real-time scanning ensures all your systems, including remote locations, are protected from current and emerging threats. VirusScan Enterprise also guards against buffer-overflow exploits that target vulnerabilities in Microsoft applications. Easy, centralized management — The McAfee ePolicy Orchestrator (ePO) platform is the centralized management console for deploying policies, managing security alerts, and viewing automated reports. Enhanced security powered by McAfee Global Threat Intelligence — McAfee Global Threat Intelligence (GTI) is a comprehensive cloud-based threat intelligence service. Already integrated into McAfee security products, it works in real time, 24 hours a day, to protect customers against cyberthreats across all vectors — file, web, message, and network. McAfee GTI offers the broadest threat data, most robust data correlation, and most complete product integration in the industry. McAfee’s GTI network allows enabled products to evaluate threats on multiple vectors in real time, leading to faster identification of threats and higher capture rates. VirusScan Enterprise uses the McAfee GTI file reputation service to identify suspicious files before they are necessarily identified as carrying malicious payloads

立即下载
Black Hat Python

Black Hat Python Python Programming for Hackers and Pentesters When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities – writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.

立即下载
Python Programming for Hackers and Pentesters

Python is the high-level language of choice for hackers and software security analysts because it makes it easy to write powerful and effective security tools. A follow-up to the perennial best-seller Gray Hat Python (2011), the all-new Black Hat Python explores the darker side of Python's capabilities—writing network sniffers, manipulating packets, web hacking, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more. By showing how carefully crafted code can be used to disrupt and disable a system, Black Hat Python will help you test your systems and improve your security posture. Insider techniques and creative challenges show you how to extend the hacks, and are sure to make Black Hat Python irresistible to anyone interested in offensive security.

立即下载
Spyware Terminator 2.0

Spyware Terminator is a full-feature adware and spyware scanner with real-time protection that can remove or quarantine spyware, adware, Trojans, keyloggers, home page hijackers and other malware threats. The scan behavior can be customized based on your level of experience, ranging from automatic interception to complete user control over how to handle any potential threats. Spyware Terminator offers manual and scheduled scans as well as real-time protection for your browser settings, HOSTS file, startup entries and other system areas. The program can optionally use ClamAV for additional virus protection. Other features include a file analysis tool, system restore, Locked File Removal, integrated spyware reporting, automatic updates and more.

立即下载
Automated containment of rootkits attacks 自動抵禦rootkis 攻擊

自動抵禦rootkis 攻擊 Rootkit attacks are a serious threat to computer systems. Packaged with other malwares such as worms, viruses and spyware, rootkits pose a more potent threat than ever before by allowing malware to evade detection. In the absence of appropriate tools to counter such attacks, compromised machines stay undetected for extended periods of time. Leveraging virtual machine technology, we propose a solution for real-time automated detection and containment of rootkit attacks. We have developed a prototype using VMware Workstation to illustrate the solution. Our analysis and experimental results indicate that this approach can very successfully detect and contain the effects of a large percentage of rootkits found for Linux today. We also demonstrate with an example, how this approach is particularly effective against malwares that use rootkits to hide.

立即下载
关闭
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
点击完成任务获取下载码
输入下载码
为了良好体验,不建议使用迅雷下载
img

Trojans Worms

会员到期时间: 剩余下载个数: 剩余C币: 剩余积分:0
为了良好体验,不建议使用迅雷下载
VIP下载
您今日下载次数已达上限(为了良好下载体验及使用,每位用户24小时之内最多可下载20个资源)

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
开通VIP
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分 C币抽奖
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
为了良好体验,不建议使用迅雷下载
确认下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
为了良好体验,不建议使用迅雷下载
VIP和C币套餐优惠
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
为了良好体验,不建议使用迅雷下载
确认下载
下载
您还未下载过该资源
无法举报自己的资源

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

若举报审核通过,可返还被扣除的积分

  • 举报人:
  • 被举报人:
  • *类型:
    • *投诉人姓名:
    • *投诉人联系方式:
    • *版权证明:
  • *详细原因: