Selasa, 14 Februari 2006
Modifying exe's to dll's for firewall bypass
well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user trusts explicitly. If the software firewall tells Mr X that explorer.exe needs to access the internet, the user is unlikely to disagree.The malicious hacker has a special program called injector.exe
0 komentar:
Posting Komentar