×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [original dll]
Interoperation
474 views
User-mode rootkits Modifications to the system at the user-level that hide the attacker and/or provide backdoor access Replace or modify normal binary
233 views
User-mode rootkits
102 views
A Programmer’s view on .NET
60 views