tag:blogger.com,1999:blog-2411170419120336148.post2156866838823037266..comments2020-08-23T23:05:57.579-07:00Comments on A blog about rootkits research and the Windows kernel: Zegost - analysis of the Chinese backdoorArtem Baranovhttp://www.blogger.com/profile/17963619118870289264[email protected]Blogger4125tag:blogger.com,1999:blog-2411170419120336148.post-34344724077469386052013-03-28T08:30:28.980-07:002013-03-28T08:30:28.980-07:00interesting ! Could you provide a sample? (:interesting ! Could you provide a sample? (:angel_killahhttps://www.blogger.com/profile/01548691835642407246[email protected]tag:blogger.com,1999:blog-2411170419120336148.post-79071298952361811972013-01-03T00:20:15.403-08:002013-01-03T00:20:15.403-08:00very informative and detailed analysis. Could you ...very informative and detailed analysis. Could you please share what are the different tools been used for the analysis.Preethttps://www.blogger.com/profile/12117949923778577170[email protected]tag:blogger.com,1999:blog-2411170419120336148.post-85461827516193420792012-12-25T05:07:25.722-08:002012-12-25T05:07:25.722-08:00thank you brothank you broArtem Baranovhttps://www.blogger.com/profile/17963619118870289264[email protected]tag:blogger.com,1999:blog-2411170419120336148.post-86055280346987925002012-12-25T05:04:47.902-08:002012-12-25T05:04:47.902-08:00Good analysis!Good analysis!R136a1https://www.blogger.com/profile/07912616682352437666[email protected]
文章来源: https://artemonsecurity.blogspot.com/feeds/2156866838823037266/comments/default
如有侵权请联系:admin#unsafe.sh