Name                    Last modified       Size  Description

[FOLDER] Parent Directory 26-Oct-2006 14:16 - Agonizing Memories [DIR] coding/ 15-May-2006 18:39 - prog docs sources rezo asm c/c++ perl [DIR] crypto/ 14-May-2005 22:46 - analysis algo stegano wordlists [DIR] esprit/ 27-Nov-2005 18:17 - le maitre des âmes [DIR] reseau/ 23-Oct-2005 14:11 - sekurité, monitor et défense réseau [DIR] search/ 11-Mar-2006 16:20 - saint-bernard des textes enneiges [DIR] sysadm/ 17-Mar-2006 12:09 - unix guides admin seku kernel [DIR] vxdevl/ 22-Aug-2006 15:54 - naissance intelligence cybernétique [DIR] windoz/ 15-May-2006 18:36 - magicien d'oz et univers microsoft [IMG] hostedbybrain.gif 10-Jan-2005 01:44 7k serveur langoureusement heberge par Brain-Override Digital Network securite reseaux [TXT] repositorium.html 14-May-2005 23:13 5k ¤º`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø [DIR] upload.php 15-Mar-2005 21:08 12k option ftp://madchat.org/incoming/madchat/ [DIR] |mail|.php3 14-Nov-2004 13:39 12k donner sa langue au chat du dr.gang

 
,------------------------------------------------------------------
| madchat.org # updates # buildtime: 20060822 # donjon files: -===~
| 'Saphire'
|
|,------------ /esprit/textes/ebooks/
| Friedrich Nietzsche - Ainsi parlait Zarathoustra.pdf
| Friedrich Nietzsche - Le voyageur et son ombre.pdf
| Friedrich Nietzsche - Seconde considération inactuelle.pdf
|
| Leibniz - La Monadologie.pdf
|
| Adolphe Thiers - Histoire de la Revolution française, IX.pdf
| Adolphe Thiers - Histoire de la Revolution française, VIII.pdf
|
| Emmanuel Kant - Fondements de la métaphysique des moeurs.pdf
| Emmanuel Kant - Traité de Pédagogie.pdf
|
,------------ /vxdevl/library
| A Survey on Tools for Binary Code Analysis.pdf
| A System to Support the Analysis of Antivirus Products' Virus Detection Capabilities.pdf
| An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms.pdf
| An Inside Look at Botnets.pdf
| An Introduction to Computer Viruses (and other Destructive Programs).pdf
| Analyse du risque viral sous OpenOffice.org 2.0.x.pdf
| Anatomy of a Commercial-Grade Immune System.pdf
| Attacks and Malware.pdf
| Automatically Generated Win32 Heuristic Virus Detection.pdf
| Lessons from Virus Developers: The Beagle Worm History Through April 24, 2004.pdf
| Back to the Future: A Framework for Automatic Malware Removal and System Repair.pdf
| Creating Antivirus Signatures.pdf
| Defeating Polymorphism: Beyond Emulation.pdf
| Detecting self-mutating malware using control-flow graph matching.pdf
| Epidemiological Models of Peer-to-Peer Viruses and Pollution.pdf
| Executable Content Problem and Malicious code (Part 1).pdf
| Execution Control Lists - An Approach to Defending Against New and Unknown Malicious Software.pdf
| Formats de fichiers et code malveillant.pdf
| Host-Based Detection of Worms through Peer-to-Peer Cooperation.pdf
| Identify How to Protect Your Network Against Viruses.pdf
| Implementation of a Computer Immune System for Intrusion and Virus Detection.pdf
| Imposing Order on Program Statements to Assist Anti-Virus Scanners.pdf
| Information Hiding in Program Binaries.pdf
| Inside Windows Rootkits.pdf
| Intruders and viruses.pdf
| Les virus et le spam - ce qu'il faut savoir.pdf
| Malicious Codes in Depth.pdf
| Malicious Logic.pdf
| Metamorphic Code.pdf
| Modular Worms.pdf
| Network-Level Polymorphic Shellcode Detection Using Emulation.pdf
| Open Problems in Computer Virus Research.pdf
| PDA Viruses - The New Frontier.pdf
| Remote Windows Kernel Exploitation - Step into the Ring 0.pdf
| Reverse Engineering for Malware Analysis.pdf
| Rootkit Detection.pdf
| Sandbox Technology Inside AV Scanners.pdf
| Script-Based Mobile Threats.pdf
| Some Further Theoretical Results about Computer Viruses.pdf
| Some Notes on Malware.pdf
| Stealth Breakpoints.pdf
| Symantec Internet Security Threat Report - Trends for July 05-December 05.pdf
| The Art of Stealthy Viruses.txt
| The Evolution of Malicious IRC Bots.pdf
| The Life and Times of Ddabx.dll.pdf
| The New Anti-Virus Formula - How to Use Multilayered Security to Defeat Viruses.pdf
| The Digital Insider: Backdoor Trojans.pdf
| Understanding Symantec’s Anti-virus Strategy for Internet Gateways.pdf
| Understanding and Managing Polymorphic Viruses.pdf
| Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks.pdf
| Virus Glossary.pdf
| Viruses and Worms.pdf
| Viruses and virus detection.pdf
| Viruses, Worms and Trojans.pdf
| Viruses, Worms, Zombies, and other Beasties.pdf
| Win32 Static Analysis in Python.pdf
| Zmist Opportunities.pdf
|
,------------ /vxdevl/vxmags
| RRLF #7
|
,------------ /vxdevl/vxsrc
| MSIL.Snoopy
| MSIL.Yeha
|
| VBS.Eddieboy.a  
| VBS.Eddieboy.b  
| VBS.Eddieboy.c  
| VBS.Gomez.a  
| VBS.Grouch
|
| Win32.Fleabot
| Win32.Morw
| Win32.Ston
| Win32.Butterflies
| Win32.Letum
| Win32.Zotob
| Win32.Insomnia
| Win32.Mescaline
| Win32.Ataxia
| Win32.Jeremy
| Win32.Psyclon
| Win32.Blaster
| Win32.KaZaM
| Win32.WolfHeart
|
| Epoc.Orter
|
| IRC-Worm.Evolution
|
| Menuet.Oxymoron
|
| Perl.Santy
|
| SymbOS.Cabir
|
`------------------------------------------------------------------

,------------------------------------------------------------------
| madchat.org # updates # buildtime: 20060801 # donjon files: -===~
| 'the undead'
|
,------------ /vxdevl/library
| A Closer Look at the Worm_Mimail.A.mht
| A Portrait of Jini.pdf
| A Practical Understanding of Malware Security.pdf
| A pact with the Devil.pdf
| Access For Sale - A New Class of Worm.pdf
| Advanced Windows 2000 Rootkits Detection.pdf
| Advanced communication techniques of remote access trojan horses on Windows operating system.pdf
| An Overview of The Seventh International Virus Bulletin Conference.mht
| Attacks and Malware.pdf
| Botnets as a Vehicle for Online Crime.pdf
| Creating signatures for ClamAV.pdf
| DKOM (Direct Kernel Object Manipulation).pdf
| Defeating Kernel Native API Hookers by Direct KiServiceTable Restoration.pdf
| Detecting the Presence of Virtual Machines Using the Local Data Table.pdf
| Detection of Viral Activity using Anomaly Detection Techniques over System Profile.pdf
| Dissecting Distributed Malware Networks.pdf
| Distributed & Collaborative Worm Detection Experiments.pdf
| E-mail Virus Protection Handbook.pdf
| Fast Detection of Scanning Worm Infections.pdf
| Fighting EPO Viruses.pdf
| Free Anti-Virus Tips and Techniques.pdf
| How To Trick Anti-virus Systems - Making Things Undetectable.mht
| Inside Windows Rootkits.pdf
| Intelligent Malware Defense for Insider Threats in Mobile Networks.pdf
| Malwares - La menace de l'intérieur.pdf
| Manipulating The Internet.pdf
| Mobilité, quand tout ordinateur peut devenir cheval de Troie.pdf
| PDA Viruses - The New Frontier.pdf
| Rapport F-Secure sur la sécurité informatique - Janvier à juin 2006.pdf
| Risk Analysis of Mobile Devices with Special Concern of Malware Contamination.pdf
| Rootkits - The new wave of invisible malware is here.pdf
| Rootkits Analysis and Detection.pdf
| Routers,Firewalls & Malware.pdf
| Run-Time Detection of Self-Replication in Binary Malware.pdf
| Some Further Theoretical Results about Computer Viruses.pdf
| Spam Zombies And Inbound Flows To Compromised Customer Systems.pdf
| Spam Zombies from Outer Space.pdf
| Spyware and Rootkits - The Future Convergence.pdf
| Summary Of Mobile Threats For Year 2005.pdf
| Symbian Malware - What It Is And How To Handle it.pdf
| Thoughts about Cross-View based Rootkit Detection.pdf
| Toward Stealthy Malware Detection.pdf
| Towards a European Malware Containment Infrastructure.pdf
| Trends of Spyware, Viruses and Exploits.pdf
| Trojan White Paper.pdf
| Trojans and Viruses.ppt
| Understanding the Virus Threat and Developing Effective Anti-Virus Policy.pdf
| Userspace Windows Rootkits via Code Injection.pdf
| Using Code Normalization for Fighting Self-Mutating Malware.pdf
| Web Sites Hawk Instructions On Making Computer Viruses - Why FBI's Hands Are Tied.pdf
| Windows rootkits in 2005, part two.pdf
|
`------------------------------------------------------------------
 
the Spice expands consciousness / Smuggled by the evil Dr.Gang
      ._____.___ .______  .______  ._______ .___.__  .______  _____._
      :         |:      \ :_ _   \ :_.  ___\:   |  \ :      \ \__ _:|
      |   \  /  ||   .   ||   |   ||  : |/\ |   :   ||   .   |  |  :|
      |   |\/   ||   :   || . |   ||    /  \|   .   ||   :   |  |   |
      |___| |   ||___|   ||. ____/ |. _____/|___|   ||___|   |  |   |
            |___|    |___| :/       :/          |___|    |___|  |___|
                           :        :->