|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T t
Length: 714 (0x2ca)
Types: TextFile
Names: »testpic.latex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦f36518b41⟧ »./worm/mit.tex.tar.z«
└─⟦87f8973c9⟧
└─⟦this⟧ »testpic.latex«
\documentstyle[12pt,marg]{report}
\margins{0in}{6.5in}{-.75in}{9in}
\newcommand{\prog}[1]{{\it #1}}
\begin{document}
\section{Flow Diagrams}
The following diagrams show the flow of data and control in some of
the more complex parts of the virus. The first shows how the
``grappling hook'' (\prog{l1.c}) was launched from an infected machine
into a victim machine. The second shows how the virus gathers
information about the host it has infected and organizes an attack on
another host.
\subsection{l1 Infection Path}
\vspace*{5in}
\special{psfile=l1picture.ps hoffset=-108 voffset=-468}
\clearpage
\subsection{Cracking Engine}
\vspace*{8in}
\special{psfile=collect.ps hoffset=-36 voffset=-108}
\end{document}