|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T t
Length: 714 (0x2ca) Types: TextFile Names: »testpic.latex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« └─⟦87f8973c9⟧ └─⟦this⟧ »testpic.latex«
\documentstyle[12pt,marg]{report} \margins{0in}{6.5in}{-.75in}{9in} \newcommand{\prog}[1]{{\it #1}} \begin{document} \section{Flow Diagrams} The following diagrams show the flow of data and control in some of the more complex parts of the virus. The first shows how the ``grappling hook'' (\prog{l1.c}) was launched from an infected machine into a victim machine. The second shows how the virus gathers information about the host it has infected and organizes an attack on another host. \subsection{l1 Infection Path} \vspace*{5in} \special{psfile=l1picture.ps hoffset=-108 voffset=-468} \clearpage \subsection{Cracking Engine} \vspace*{8in} \special{psfile=collect.ps hoffset=-36 voffset=-108} \end{document}