by: fix |
last post by:
Hello,
i need to protect my xsl file.
In my xsl i have a mechanism for defining a personal stylesheet, what i want to do
is, if it possible, find a mechanism for Obfuscated the xsl source code ....
|
by: assaf |
last post by:
hi all
i am using PreEmptive Solutions dotfuscator (community edition).
and i am getting 'TypeLoadException' for a simple interface that i defined.
how can i debug an obfuscated application?
...
|
by: Mad Programmer |
last post by:
I'm writing a destructive trojan with C++ and I need to know how I can
destroy the target's monitor and format the target's harddisk before the
target can stop the program.
What do I need to do?
|
by: Sony Music CDs install Malware |
last post by:
Whether you are a web surfer or a C++ developer, if you use Windows be
cautioned about SONY music CDs. They contain 'viewer' type software that is
actually a trojan horse for a "rootkit". The...
|
by: Paul E Collins |
last post by:
For those who appreciate such things, here's a bit of obfuscated C# I
knocked up in a spare moment at work.
http://CL4.org/comp/jabberwocky.txt
P.
--
www.CL4.org
|
by: irfan200x |
last post by:
How Should i Remove the Trojan Virus in my system Windows XP SP2?
Is some body have the Full Software Then send to me my E-mail Address is
bye
|
by: priya08 |
last post by:
System affected by Trojan horse virus. Anti-virus is having in the system but it is detecting the virus but not removing the virus...
Tell some antivirus to remove it....
when the system is logged...
|
by: pangsans |
last post by:
hai
i have a problem here because of a trojan attack..its called trojan agent horse.ACNS i googled it and could not find any relevant information. this trojan does not let me run anything.for...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|