The website had updated, please click visit the new version
Hacker_Defender Other systems 2090000 source codes to download - www.pudn.com
 File: Hacker_DefenderDownload  >Add to favorates  [Vote: very good!  5  4  3  2  1 Vote: very bad!]
  Directory: Other systems
  Dev tools: Visual C++
  File size: 90 KB
  Update: 2006-03-15
  Downloads: 467
  Uploader: Ԭ
 Describe: backdoor kernel-level software, users of the software can be hidden files, processes, systems and services, the system drive, registry keys and the keys , open ports and fictitious available disk space. Programs are also memory camouflage it changes made to the stealth and hidden control process. Installation hidden back door, registered hidden and system services to install the system drive.
File list(Click to check if it's the file you need, and recomment it at the bottom):
  read it.txt
  src
  ...\bdcli100.dpr
  ...\driver
  ...\......\driver.c
  ...\......\driver.h
  ...\......\driver.sys
  ...\......\makefile
  ...\......\sources
  ...\driver.res
  ...\hxdef100.dpr
  ...\rdrbs100.dpr
  ...\rdrbs100.res
  ...\units
  ...\.....\UJQCompress.pas
  ...\.....\UList.pas
  ...\.....\UProcAPI.pas
  ...\.....\USysUtils-Case.inc
  ...\.....\USysUtils-NumStrConv.inc
  ...\.....\USysUtils.pas
  ...\.....\UTcp.pas
Please Comment: [Very Good!] [Commonly] [passworded] [Bad Descibe] [Not code/document] [lost file]  [Can't uncompress] [Very bad!] [Note]
 []:˵ [QQ]:Very Good
 Search in more than 2096520 codes/documents:
 [sars_final.tar.gz] - a C language to write the backdoor, I do not know here is not looking through the moderator
 [Drv_HideFile.rar] - achieve the driver layer of documents hidden development environment : VC WIN2000 DDK
 [networktopologymappingandanalysistools-mappi] - network topology mapping of the typical code, can understand how the LAN topology discovery

 [fantanshi.rar] - rebound-source code, the distance Capturing the Screen, switching machines, modify the registry, file uploading and downloading functions
 [Winpooch-0.5.4-src.zip] - Winpooch can monitor Windows systems (2000, XP, 2003, but only 32-bits). It monitoring system changes in order to detect Trojan horse or spyware insta
 [hackersXfactor-"hackersXelement"] - hackers X factor- "hackers X element" Ultimate X version hackers out of the final elements of a network security of e-books
 [5ivb_582946.rar] - best 331 programming source code, detailed explanations. We speak up, thank you
 [dkomdriver.rar] - ntrootkit driven category hidden drive module
 [OpenPortsv1.2.rar] - and typically close to one thing, but can be seen to be hidden rootkit port
 [hackerDefender1[1]ohsourcecode.Zip] - hacker Defender 1.0.0 kernel-level backdoor software, users of the software can be hidden files, processes, systems and services, the system drive, re