How to make a wooden black horse free to kill, how to make a software free kill?

Updated on technology 2024-02-08
12 answers
  1. Anonymous users2024-02-05

    Hehe! If you want to deceive the current killing of soft without some technology, it is not good!

  2. Anonymous users2024-02-04

    If it's just beginning, it's best to learn from the feature code free kill, and then learn the source code free kill, and then learn the source code free kill, which is a little better.

  3. Anonymous users2024-02-03

    Learn not to kill the beetle.

  4. Anonymous users2024-02-02

    Let's take a look at the introduction of the wooden ox and flowing horse in the book: square belly bent head, one foot and four legs, head into the collar, tongue in the abdomen, carry more and travel less, dozens of miles for solo travelers, and twenty miles for group walkers. The vertical one is the cow tongue, the curved one is the cow rib, the carved one is the cow tooth, the standing one is the horn, and the cow is on the back.

    The man walks six feet, and the ox walks four steps. Flowing horse: The ribs are three feet five inches long, the same as the left and right.

    The front axle hole is divided into four inches, the front foot hole is four inches and five minutes to the front axle hole, and the plate is two square bags. Judging from the description in the book, the wooden ox is the equivalent of an engine, and the flowing horse is just a device for loading things, which is equivalent to the compartment of a car. Judging from the structure of the wooden ox, it adopts a booster mechanism, which may have a flywheel mechanism added to it.

    In terms of his operation, there is a gear mechanism and a crank connecting rod mechanism. When people push the wooden ox, the crank connecting rod mechanism inside drives the flywheel through the gear, and after the flywheel runs, because of the inertia of the flywheel, the wooden ox is boosted, so that the purpose of labor-saving is achieved. The structure of the flowing horse is actually a board car, but its center of gravity and bearing part have been changed, making it more labor-saving than the previous board car.

    As for what the book says about this for cattle and what for cattle that is, this is just a habit of the Chinese, used to increase the mystery of wooden cattle, just like Zhou Yishang said, what horses are like and so on. The wooden ox has four legs, in fact, it is a wheel, in ancient times, there was no professional mechanical term, so the expression of some parts and components will be different from the current one. There is speculation that the wooden ox walks on its feet, but this requires a hydraulic mechanism, which is impossible under the conditions of the time.

    It is impossible to shake it with your hands. Because there are too many mechanisms used in this way, some of which were not invented at that time. As for twisting the cow's tongue, you can't walk, the reason is very simple, there is an anti-reversal ratchet mechanism in it.

    Of course, I'm just speculating based on the records in the Romance of the Three Kingdoms. But it shouldn't be too far off. I don't have any detailed information about the Wooden Ox and Flowing Horse at the moment, but I just speculate based on my experience.

    There may be a complicated imagination, but I think it is more reasonable, and the structure adopted in this way is relatively simple and in line with the productivity situation at the time. Our sages seem to have joined forces to preserve an age-old mystery to test the wisdom of our descendants.

  5. Anonymous users2024-02-01

    The Wooden Ox Flowing Horse is a means of transportation during the Three Kingdoms period, it is made by Zhuge Liang and is also a legendary means of transportation, it does not use any external force and does not need strength**. It is recorded in the annals. Wish.

  6. Anonymous users2024-01-31

    It can be packed multiple times, so that no matter how powerful the antivirus software is, it can't be detected.

  7. Anonymous users2024-01-30

    Landlord, your behavior violates the law, even if you have it, you can't give it to you.

  8. Anonymous users2024-01-29

    Today's antivirus software is based on the signature code of the virus. In order to prevent the Trojan from being killed by antivirus software, hackers will modify or disguise it through various methods, that is, carry out non-killing treatment.

    At present, the common no-kill methods include packing, flowering (instructions), modifying feature codes, changing entry points, and encrypting entry points. At the same time, the current mainstream antivirus software uses composite feature codes, so it is difficult to achieve the no-kill effect through one method in many cases, and several methods are needed to cooperate to achieve the no-kill effect. Actual combat program no-kill 1. No-kill starts from inside the program Prepare the hacking program we want to kill free.

    First of all, the encryption process is carried out, and the encryption program maskpe is run, which is a software that automatically modifies the PE file, which can scramble the original source of the program, so that it can generate a non-killing Trojan horse or virus. Click the "Load File" button to select the anti-kill program, select any item in the "Select Information" list, and finally click the "Make File" button to save the encrypted file in the pop-up window. 2. Flower instructions to confuse the antivirus software Run the "Super Flower Adder", which is a new flower program.

    First, drag the server-side program directly to the main interface of the program to release it, then select a flower command in the "Flower Command" drop-down list, and click the "Add Flower" button. In this way, a flower instruction is successfully added to the front of the hacking program**, and the antivirus software that extracts the feature code from the file header is powerless. 3. Analysis of packing to prevent antivirus software and then carry out packing processing, which can prevent the antivirus software from comparing the obtained source** and feature code.

    Run the Private Exe Protector packer and set the hacking program you want to kill in the list of "Applications" that appears. Then check "Dynamic Protection" in the "Settings" option below, and finally click the "Start Protection" button in the toolbar to immediately pack the process. Fourth, change the entry point anti-feature code comparison Finally, the purpose of changing the entry point is similar to the packing, that is, the antivirus software cannot obtain the source from the entry point of the hacker program.

    Run the peditor software modifier, click the "Browse" button to select the hacking program, find the "Entry Point" information option, then add 1 to the original value, and then click the "Apply Changes" button to complete the setting confirmation. When the hacker program has completed the no-kill process, it must first be tested with multiple anti-virus software, and users who do not have anti-virus software installed can also use a multi-engine sample to detect viruses**. If it has not been killed by antivirus software, you should also test whether the program can run normally after the non-killing process locally.

    Only after this series of tests can it be determined whether the hacking program is successful or not.

  9. Anonymous users2024-01-28

    Creation, Maha Soul, Blessing.

  10. Anonymous users2024-01-27

    You can yoxo no-kill net horse, no thanks, I'm Lei Feng!

  11. Anonymous users2024-01-26

    Nethorse is free to kill, and encryption is free to kill.

  12. Anonymous users2024-01-25

    Wrapping the file will prevent you from killing.

Related questions
22 answers2024-02-08

It's okay It's going to be a lot better after 90, and the beginning of everything in World of Warcraft is still at the top.