摘要:
This paper attempts to analyze the characteristics from the attacker's point of view about the currentopen source rootkit key technology, hope can find common features of rootkit damage andhidden, and developed a general strategy for rootkit defense and counter method 阅读全文
posted @ 2014-08-02 17:21
郑瀚
阅读(5877)
评论(9)
推荐(1)
摘要:
linux kernel/user mode data struct learning 阅读全文
posted @ 2014-08-02 11:19
郑瀚
阅读(9964)
评论(3)
推荐(10)

浙公网安备 33010602011771号