iexpress捆绑技术介绍(本人捆绑技术介绍).docVIP

  • 42
  • 0
  • 约1.21万字
  • 约 12页
  • 2017-10-07 发布于河南
  • 举报

iexpress捆绑技术介绍(本人捆绑技术介绍).doc

iexpress捆绑技术介绍(本人捆绑技术介绍)

iexpress捆绑技术介绍(本人捆绑技术介绍) Tools introduction: Name: IExpress Function: special tool for making various CAB compression and self extracting packages. Actual operation In this section, the author will explain the whole process of bundling Trojan horse in the form of examples. First step In the run dialog box, enter IExpress to start the program (Figure 1). In the beginning there will be two options for you to choose, one is to create a new self extracting file (Create new Self Extraction Directive file), another is open the self extracting template .Sed file has been saved (Open existing Self Extraction Directive file). We should select the first item, and then click the next button. [... --empirenews.]! Second steps The next choice made from three kinds of Trojan packaging decompression package (Figure 2), which is the establishment of a self extracting and automatic installation package (Extract files and run an installation command), a self extracting compressed package (Extract files only) and CAB (Create compressed a package of files only). Because we have to make the Trojan decompression package, so we should choose the first item. After you enter the header of the compressed package, click the next button. Third steps In the confirmation (Confirmation prompt) this link, the software will ask for confirmation before unpacking in the Trojan program prompts the user, because we are in the making of Trojan horse extract package, of course the more subtle better, choose the first tip (No prompt), the goal is to let people in there beware of. Click next button in the next add user permission agreement (License agreement) added a fake user agreement confuse those caught, select show the user permission agreement (Display a license), choose a good TXT document editing click Browse, this document can be used in Microsoft Corp the name of the editor, set up after the click next. The purpose of this step is to confuse the opponent and hide the Trojan horse installation pro

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档