(This is a sharp blade to cut off the black hand. It is applicable to windows2000/xp/2003 operating system. Its internal function is very powerful. It is used to detect and deal with the behind the scenes black hand in the system - the Trojan horse back door You may have used a lot of software with similar functions, such as some process tools and port tools, but now the system level backdoor function is becoming more and more powerful. Generally, it is easy to hide the process, port, registry and file information, and ordinary tools cannot find these behind the scenes Icesword uses a large number of novel kernel technologies to make these backdoors invisible Of course, using it requires users to have some knowledge of the operating system Please read the instructions carefully before use Before explaining the software, first explain the first note: do not activate the kernel debugger (such as softice) when the program is running, otherwise the system may crash immediately In addition, please save your data before use in case of loss caused by unknown bugs Icesword is currently only designed for systems using 32-bit x86 compatible CPUs. In addition, running icesword requires administrator privileges Please save the data for the first time. Using icesword requires you to bear the possible risks caused by bugs. Thank you
This document contains the following attachments:
IceSword122cn\
IceSword122cn\Cooperator. zip
IceSword122cn\FileReg. chm
IceSword122cn\FileReg. icp
IceSword122cn\IceSword. chm
IceSword122cn\IceSword. exe
IceSword122cn\readme. txt)