File: IceSwordDownload   Add to favorates  [Vote: very good!  5  4  3  2  1 Vote: very bad!]
  Directory: Other systems
  Dev tools: Visual C++
  File size: 920 KB
  Update: 2006-07-20
  Downloads: 5519
  Uploader: zwf0713
 Describe: iceSword Skates scrapping Trojan .......................
File list(time 2004110820~2009021021)(Click to check if it's the file you need, and recomment it at the bottom):
  IceSword
  ........\Cooperator
  ........\..........\ChkFile
  ........\..........\.......\12_8.ckf
  ........\..........\.......\sample.txt
  ........\..........\.......\说明.txt
  ........\..........\Cooperator.h
  ........\..........\example
  ........\..........\.......\CopyFile.cpp
  ........\..........\.......\EnumProcess.cpp
  ........\..........\.......\FindFile.cpp
  ........\..........\.......\RegOpt.cpp
  ........\..........\IceSword.dll
  ........\..........\IceSword.lib
  ........\..........\SCANSTAR.exe
  ........\..........\ScanStar.txt
  ........\IceSword.chm
  ........\IceSword.exe
  ........\说明.txt
 To Search: icesword trojan 
 Search in more than 1820000 codes/documents:
 [aninterceptionofthetrojancode.Rar] - an interception of the trojan program documents, on the network as a firewall
 [PersonalProxy.rar] - Visual C development of a personal firewall, to the relevant developers have to know significance.
 [wedll_rcremap.zip] - This is a dynamic link library on the available procedures, please s

 [Lesson18Code.zip] - ActiveX controls in the preparation, how to control arrangements for the properties, methods, events, properties page Persistent storage, and how to c
 [nmap-3.90-win32.zip] - nmapp strongest scanning tools, professional analysis of the port and detection system
 [qianrushicaijianzhuangjia.tar.gz] - for reduction system is a good way of helping to do the transplant Embedded System Tools
 [icesword1.18.zip] - own look, sensible people know, the usual hacking tools more convenient, very simple
 [icesword1.18.rar] - hao
 [OpPorts12.zip] - the netstat like windows look like the machine open source port procedures, The author is a well-known rootkit hxf100 authors main program delphi, c-d
 [teachyouhowtowriteatrojanhorse.Rar] - fully prepared trojan teach you, so you become so expert Trojans can produce a quality Trojan program, but also allows you to better understand Trojan