版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.
http://rapidshare.com/files/52220331/193176946X.zip
http://rapidshare.com/files/52619474/193176946X.zip
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.
http://rapidshare.com/files/52220331/193176946X.zip
http://rapidshare.com/files/52619474/193176946X.zip
本文详细解释了黑客、病毒及蠕虫如何从互联网攻击计算机并利用软件安全漏洞,探讨了防病毒软件、补丁及防火墙的作用与局限性。此外,还介绍了高级攻击手段及如何在Windows和Unix系统中发现并修复安全漏洞。
1万+

被折叠的 条评论
为什么被折叠?



