DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T t

⟦832546bc9⟧ TextFile

    Length: 714 (0x2ca)
    Types: TextFile
    Names: »testpic.latex«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« 
        └─⟦87f8973c9⟧ 
            └─⟦this⟧ »testpic.latex« 

TextFile

\documentstyle[12pt,marg]{report}
\margins{0in}{6.5in}{-.75in}{9in}
\newcommand{\prog}[1]{{\it #1}}
\begin{document}
\section{Flow Diagrams}

The following diagrams show the flow of data and control in some of
the more complex parts of the virus. The first shows how the
``grappling hook'' (\prog{l1.c}) was launched from an infected machine
into a victim machine. The second shows how the virus gathers
information about the host it has infected and organizes an attack on
another host.

\subsection{l1 Infection Path}
\vspace*{5in}
\special{psfile=l1picture.ps hoffset=-108 voffset=-468}

\clearpage
\subsection{Cracking Engine}
\vspace*{8in}
\special{psfile=collect.ps hoffset=-36 voffset=-108}

\end{document}