by: msnews |
last post by:
Hi, All
i really want to make a program that protect my system like Ad-aware or
Spybot..
socalled Spyware..
but i don't know about developing these program.
how can i have to do? could...
|
by: freddy |
last post by:
I would like to know how to write a spyware program.
|
by: ~~~ .NET Ed ~~~ |
last post by:
Hi,
Are there any known bad interactions between an ASP.NET (1.1)/IIS
installation and the MS Windows Anti-spyware Beta? I have a working XP Pro
with ASP.NET and don't want to let it go to hell....
|
by: Mark Rae |
last post by:
Hi,
Just a general question, really...
Is anyone here using any of Microsoft's latest anti-virus / anti-spyware
software?...
|
by: vighnesh |
last post by:
Hai All
Can anybody please tell me what are the standard registry locations that are
affected by Virus's , Spyware and Adware Programs.
Thanks in advance
Regards
Vighneswar
|
by: UJ |
last post by:
SonicWall seems to be treating as Spyware. Has anybody seen WebServices
being treated as SpyWare from SpyWare Detection programs? If so, is there
anyway around it?
TIA - Jeff.
|
by: =?Utf-8?B?SmltIFQ=?= |
last post by:
I run WD and do not see any spyware detected at all. I then run any or all of
Ad-Aware, Spybot and Zone Alarm and spyware is always detected. Obviously WD
did not block any of these, and it...
|
by: Victor Smootbank |
last post by:
I'm an evil spy and I want to spy on other computer users
to gather information about them, that will make me incredibly
powerful.
How can I write spyware in C ???
|
by: pavanip |
last post by:
Hi friends,
I am developing one application like Anti spyware.how to get those spyware dlls present in our registry or our system.And what is adware,Trojans, Malware, Keylogger.how to find...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|