Stella 发表于 2014-1-9 00:14 我也是B型血。话说用平板看水帖太累了。。。。没找到直接到末页的选项。。划屏用了快一分钟才到最后一页 ...
使用道具 举报
昂宿星团人 发表于 2014-1-10 13:06 可以直接改地址嘛
COMODO LEAKTESTS V.1.1.0.3 Date 21:47:34 - 2014/1/11 OS Windows Vista SP0 build 9200 1. RootkitInstallation: MissingDriverLoad Protected 2. RootkitInstallation: LoadAndCallImage Protected 3. RootkitInstallation: DriverSupersede Protected 4. RootkitInstallation: ChangeDrvPath Vulnerable 5. Invasion: Runner Vulnerable 6. Invasion: RawDisk Vulnerable 7. Invasion: PhysicalMemory Protected 8. Invasion: FileDrop Vulnerable 9. Invasion: DebugControl Protected 10. Injection: SetWinEventHook Vulnerable 11. Injection: SetWindowsHookEx Vulnerable 12. Injection: SetThreadContext Protected 13. Injection: Services Vulnerable 14. Injection: ProcessInject Protected 15. Injection: KnownDlls Vulnerable 16. Injection: DupHandles Protected 17. Injection: CreateRemoteThread Protected 18. Injection: APC dll injection Protected 19. Injection: AdvancedProcessTermination Protected 20. InfoSend: ICMP Test Protected 21. InfoSend: DNS Test Vulnerable 22. Impersonation: OLE automation Protected 23. Impersonation: ExplorerAsParent Protected 24. Impersonation: DDE Vulnerable 25. Impersonation: Coat Vulnerable 26. Impersonation: BITS Protected 27. Hijacking: WinlogonNotify Protected 28. Hijacking: Userinit Vulnerable 29. Hijacking: UIHost Protected 30. Hijacking: SupersedeServiceDll Vulnerable 31. Hijacking: StartupPrograms Vulnerable 32. Hijacking: ChangeDebuggerPath Protected 33. Hijacking: AppinitDlls Vulnerable 34. Hijacking: ActiveDesktop Protected Score 190/340
COMODO LEAKTESTS V.1.1.0.3 Date 21:50:30 - 2014/1/11 OS Windows Vista SP0 build 9200 1. RootkitInstallation: MissingDriverLoad Protected 2. RootkitInstallation: LoadAndCallImage Protected 3. RootkitInstallation: DriverSupersede Protected 4. RootkitInstallation: ChangeDrvPath Protected 5. Invasion: Runner Protected 6. Invasion: RawDisk Protected 7. Invasion: PhysicalMemory Protected 8. Invasion: FileDrop Protected 9. Invasion: DebugControl Protected 10. Injection: SetWinEventHook Vulnerable 11. Injection: SetWindowsHookEx Vulnerable 12. Injection: SetThreadContext Protected 13. Injection: Services Protected 14. Injection: ProcessInject Protected 15. Injection: KnownDlls Vulnerable 16. Injection: DupHandles Protected 17. Injection: CreateRemoteThread Protected 18. Injection: APC dll injection Protected 19. Injection: AdvancedProcessTermination Protected 20. InfoSend: ICMP Test Protected 21. InfoSend: DNS Test Vulnerable 22. Impersonation: OLE automation Protected 23. Impersonation: ExplorerAsParent Protected 24. Impersonation: DDE Protected 25. Impersonation: Coat Vulnerable 26. Impersonation: BITS Protected 27. Hijacking: WinlogonNotify Protected 28. Hijacking: Userinit Protected 29. Hijacking: UIHost Protected 30. Hijacking: SupersedeServiceDll Protected 31. Hijacking: StartupPrograms Protected 32. Hijacking: ChangeDebuggerPath Protected 33. Hijacking: AppinitDlls Protected 34. Hijacking: ActiveDesktop Protected Score 290/340
acp134 发表于 2014-1-11 22:04 有木有人玩过Comodo Leaktests ESS不同的HIPS模式差距真心很大…… 带规则的自动模式:
Stella 发表于 2014-1-11 13:56 波兰人民又开始yy自己的坦克了,想起以前波兰人开发的那个什么oproject@home,只能说波兰真不愧是欧洲的韩 ...
xx318088 发表于 2014-1-11 22:12 @ledled
魂魄妖梦 发表于 2014-1-12 02:34 欧洲谁都能yy一下就波兰不行啊,看二战被德国人打的那个样子。。
xx318088 发表于 2014-1-11 22:21 买的茶树油到了,刚好前几天也到了个手机三脚架架子,就用老机I8910HD和新机Xplay架上对比下,一个800W一个 ...
Stella 发表于 2014-1-12 10:13 手机三脚架?
xx318088 发表于 2014-1-12 21:16 大概就是这个样子
本版积分规则 发表回复 回帖并转播 回帖后跳转到最后一页
Archiver|手机版|小黑屋|中国分布式计算总站 ( 沪ICP备05042587号 )
GMT+8, 2025-5-20 15:20
Powered by Discuz! X3.5
© 2001-2024 Discuz! Team.