鸚鵡螺網路助手1.70破解 (11千字)
網路工具|IP工具 本站首頁
軟體名稱:鸚鵡螺網路助手 Nautilus NetKit
整理日期:2001.1.8
最新版本:1.70
檔案大小:708KB
軟體授權:共享軟體
使用平臺:Win9x
釋出公司:Home Page
下載地址:http://newhua.centurytop.net/search.asp?keyword=%F0%D0%F0%C4%C2%DD%CD%F8%C2%E7%D6%FA%CA%D6&Submit=%CB%D1%CB%F7
軟體簡介:
- 全執行緒化的電郵助手!現在重新實現的電郵助手再也不會發生阻塞主視窗操作的情況。同時透過使用可調整的執行緒數大幅提高了檢查郵件的速度。例如你可以把執行緒數設成與電郵賬
號數相同,這就意味著在檢查電郵時,對應每一個賬號都將有一個執行緒同時獨立地進行檢查。這樣可以成十倍地提高速度。
- 全新設計的埠掃描!多執行緒化:現在你可以使用最多達一百個執行緒來高速同步地進行埠地掃描。執行緒數可以該工具頁中設定。可隨意擴充的列表檔案:現在你可以隨意建立自己的埠列表檔案(副檔名為".pts"),或使用系統提供的多個預設埠列表檔案。新版的網路助手附帶了三個列表檔案:常用埠.pts
列出了各種電腦系統中最常用的服務埠代理埠.pts 列出了常用的代理服務埠木馬埠.pts 列出了相當完整的現有各種木馬程式使用的服務埠.
- IP地址掃描!IP掃描工具可以用來對當前在該工具頁中列出的所有IP地址進行迴圈的ping工作,並顯示其平均響應時間或當前狀態(啟用或未啟動)。 同時IP地址掃描工具支援IP地址列表檔案以方便使用。IP地址列表檔案使用副檔名".ips"。你可以將當前列表中的所有IP地址存入檔案,也可以從一個列表檔案中讀出所有記錄並加入當前IP地址列表。
1)在註冊名上填上:LINUX
註冊號填上:12345678
2)CTRL+D撥出SIOFTICE下BPX HMEMCPY後按F5回到註冊視窗點確定後攔住了
3)在SIOTICE中下BD*按大約是十三下F12左右就跳出一個註冊錯誤的視窗來
4)重複1-2的方法再來一次,這次就按少一下F12後來到這裡,因為計算註冊碼的地方在上面
* Possible Reference to String Resource ID=00001: ""
|
:0041A72C 6A01
push 00000001
:0041A72E E8FDFB0100 call
0043A330
:0041A733 8B4660
mov eax, dword ptr [esi+60]----------------------------來到這裡
:0041A736 8D7E60
lea edi, dword ptr [esi+60]
:0041A739 8B40F8
mov eax, dword ptr [eax-08]-------------------------在EAX中看到我的名字
:0041A73C 85C0
test eax, eax
:0041A73E 7524
jne 0041A764
:0041A740 6A30
push 00000030
* Possible StringData Ref from Data Obj ->
|
:0041A742 6868534600 push
00465368
* Possible StringData Ref from Data Obj ->
|
:0041A747 68387D4600 push
00467D38
:0041A74C 8BCE
mov ecx, esi
:0041A74E E8ADF20100 call
00439A00
:0041A753 8B4C2418
mov ecx, dword ptr [esp+18]
:0041A757 64890D00000000 mov dword ptr fs:[00000000],
ecx
:0041A75E 5F
pop edi
:0041A75F 5E
pop esi
:0041A760 83C41C
add esp, 0000001C
:0041A763 C3
ret
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0041A73E(C)
|
:0041A764 8D4C240C
lea ecx, dword ptr [esp+0C]
:0041A768 E803010000 call
0041A870
:0041A76D 8B0D2C844600 mov ecx, dword
ptr [0046842C]
:0041A773 C744242000000000 mov [esp+20], 00000000
:0041A77B 894C2408
mov dword ptr [esp+08], ecx
* Possible Reference to String Resource ID=00115: "1.75"
|
:0041A77F 6A73
push 00000073
:0041A781 8D4C240C
lea ecx, dword ptr [esp+0C]
:0041A785 C644242401 mov [esp+24],
01
:0041A78A E8A5160200 call
0043BE34
:0041A78F 8B4664
mov eax, dword ptr [esi+64]
:0041A792 8D542408
lea edx, dword ptr [esp+08]
:0041A796 50
push eax------------------------------------在這裡看到假CODE
:0041A797 51
push ecx
:0041A798 8BCC
mov ecx, esp
:0041A79A 89642418
mov dword ptr [esp+18], esp
:0041A79E 52
push edx
:0041A79F E8600F0200 call
0043B704
:0041A7A4 51
push ecx
:0041A7A5 C644242C02 mov [esp+2C],
02
:0041A7AA 8BCC
mov ecx, esp
:0041A7AC 89642420
mov dword ptr [esp+20], esp
:0041A7B0 57
push edi
:0041A7B1 E84E0F0200 call
0043B704
:0041A7B6 8D4C2418
lea ecx, dword ptr [esp+18]
:0041A7BA C644242C01 mov [esp+2C],
01
:0041A7BF E8CC010000 call
0041A990--------------------------------------這裡看起來好像是算註冊碼的地方,按F8進去看看
:0041A7C4 85C0
test eax, eax
:0041A7C6 745C
je 0041A824
:0041A7C8 8B3F
mov edi, dword ptr [edi]
:0041A7CA E8C9D40200 call
00447C98
:0041A7CF 8B4004
mov eax, dword ptr [eax+04]
:0041A7D2 57
push edi
* Possible StringData Ref from Data Obj ->"UserName"
|
:0041A7D3 680C6A4600 push
00466A0C
* Possible StringData Ref from Data Obj ->"General"
|
:0041A7D8 68046A4600 push
00466A04
:0041A7DD 8BC8
mov ecx, eax
:0041A7DF E87D680200 call
00441061
:0041A7E4 8B7E64
mov edi, dword ptr [esi+64]
:0041A7E7 E8ACD40200 call
00447C98
:0041A7EC 8B4004
mov eax, dword ptr [eax+04]
:0041A7EF 57
push edi
* Possible StringData Ref from Data Obj ->"SerialCode"
|
:0041A7F0 68F8694600 push
004669F8
* Possible StringData Ref from Data Obj ->"General"
|
:0041A7F5 68046A4600 push
00466A04
:0041A7FA 8BC8
mov ecx, eax
:0041A7FC E860680200 call
00441061
:0041A801 6A40
push 00000040
* Possible StringData Ref from Data Obj ->
|
:0041A803 6868534600 push
00465368
* Possible StringData Ref from Data Obj ->"
|
:0041A808 68147D4600 push
00467D14
:0041A80D 8BCE
mov ecx, esi
:0041A80F E8ECF10100 call
00439A00
:0041A814 8BCE
mov ecx, esi
* Possible Ref to Menu: MenuID_0066, Item: ""
|
* Possible Reference to String Resource ID=00001: ""
|
:0041A816 C7465C01000000 mov [esi+5C], 00000001
:0041A81D E80D1F0200 call
0043C72F
:0041A822 EB13
jmp 0041A837
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0041A7C6(C)
|
* Possible Ref to Menu: MenuID_0066, Item: "sQ堠K(A)"
|
* Possible Reference to String Resource ID=00016: "s?
|
:0041A824 6A10
push 00000010
* Possible StringData Ref from Data Obj ->
|
:0041A826 6868534600 push
00465368
* Possible StringData Ref from Data Obj ->
|
:0041A82B 68007D4600 push
00467D00
:0041A830 8BCE
mov ecx, esi
:0041A832 E8C9F10100 call
00439A00----------------------------------走過這個CALL的話就玩完
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0041A822(U)
|
:0041A837 8D4C2408
lea ecx, dword ptr [esp+08]
:0041A83B C644242000 mov [esp+20],
00
:0041A840 E84A110200 call
0043B98F
:0041A845 8D4C240C
lea ecx, dword ptr [esp+0C]
:0041A849 C7442420FFFFFFFF mov [esp+20], FFFFFFFF
:0041A851 E84A000000 call
0041A8A0
:0041A856 8B4C2418
mov ecx, dword ptr [esp+18]
:0041A85A 5F
pop edi
:0041A85B 64890D00000000 mov dword ptr fs:[00000000],
ecx
:0041A862 5E
pop esi
:0041A863 83C41C
add esp, 0000001C
:0041A866 C3
ret
:0041A867 90
nop
:0041A868 90
nop
:0041A869 90
nop
:0041A86A 90
nop
:0041A86B 90
nop
:0041A86C 90
nop
:0041A86D 90
nop
:0041A86E 90
nop
:0041A86F 90
nop
* Referenced by a CALL at Addresses:
|:0040DB2C , :0041A7BF
|
:0041A990 6AFF
push FFFFFFFF-------------------------------------按F8後來到這裡
:0041A992 6848EB4400 push
0044EB48
:0041A997 64A100000000 mov eax, dword
ptr fs:[00000000]
:0041A99D 50
push eax
:0041A99E 64892500000000 mov dword ptr fs:[00000000],
esp
:0041A9A5 83EC14
sub esp, 00000014
:0041A9A8 56
push esi
:0041A9A9 8BF1
mov esi, ecx
:0041A9AB 8D44240C
lea eax, dword ptr [esp+0C]
:0041A9AF 8D54242C
lea edx, dword ptr [esp+2C]
:0041A9B3 50
push eax
:0041A9B4 51
push ecx
:0041A9B5 8BCC
mov ecx, esp
:0041A9B7 8964240C
mov dword ptr [esp+0C], esp
:0041A9BB 52
push edx
* Possible Ref to Menu: MenuID_0066, Item: ""
|
* Possible Reference to String Resource ID=00001: ""
|
:0041A9BC C744242C01000000 mov [esp+2C], 00000001
:0041A9C4 E83B0D0200 call
0043B704
:0041A9C9 51
push ecx
:0041A9CA 8D442434
lea eax, dword ptr [esp+34]
:0041A9CE 8BCC
mov ecx, esp
:0041A9D0 89642414
mov dword ptr [esp+14], esp
:0041A9D4 50
push eax
:0041A9D5 C644243002 mov [esp+30],
02
:0041A9DA E8250D0200 call
0043B704
:0041A9DF 8BCE
mov ecx, esi
:0041A9E1 C644242C01 mov [esp+2C],
01
:0041A9E6 E8C5FEFFFF call
0041A8B0
:0041A9EB 8B4C2430
mov ecx, dword ptr [esp+30]
:0041A9EF 6A0A
push 0000000A
:0041A9F1 8D542410
lea edx, dword ptr [esp+10]--------------------------------真CODE
:0041A9F5 51
push ecx-----------------------------------假CODE
:0041A9F6 52
push edx----------------------------------------也是剛才看到的真CODE
:0041A9F7 E834B60000 call
00426030
:0041A9FC 83C40C
add esp, 0000000C
:0041A9FF C644242000 mov [esp+20],
00
:0041AA04 85C0
test eax, eax
:0041AA06 8D4C2428
lea ecx, dword ptr [esp+28]
:0041AA0A 752D
jne 0041AA39
:0041AA0C E87E0F0200 call
0043B98F
:0041AA11 8D4C242C
lea ecx, dword ptr [esp+2C]
:0041AA15 C7442420FFFFFFFF mov [esp+20], FFFFFFFF
:0041AA1D E86D0F0200 call
0043B98F
OK啦!我沒有仔細去分析註冊的地方,因為今天我高中時的同學聚會,喝多了兩杯,現在的頭還在痛呢,所以嗅到註冊碼就算了,這是一個不錯的軟體(我可不是作者的槍手喲!)真的很不錯。但請不要用這個軟體嗅人家的埠!後果自負!!!
相關文章
- 鸚鵡螺網路助手破解 (5千字)2001-01-19
- 鸚鵡螺網路助手1.682015-11-15
- 鸚鵡螺網路助手 1.75 破解手記 (1千字)2001-01-30
- 鸚鵡螺網路助手v1.68--胡解過程 (2千字)2001-01-13
- anti-homeMade(4):鸚鵡螺網路助手2.22 (4千字)2001-05-25
- Pexplorer 1.70 完全破解(KeyFile&Name+Code),附序號產生器~~~~~~~~~
(17千字)2002-04-03
- 暴力破解《網路吸血鬼3.3》 (9千字)2001-03-15
- 我的破解心得(11) (9千字)2001-03-13
- 神奇登錄檔0.6破解 (11千字)2001-07-27
- vfp&exe1.70註冊碼計算 (2千字)2001-06-04
- unix軟體ncftpd 2.7.1之破解(11千字)2002-04-07FTP
- 《TxEdit 4.6》的註冊碼破解 (11千字)2001-07-28
- 破解心得之CHMMaker(耶圃歟┢ (11千字)2002-01-27HMM
- SuperCleaner2.30破解過程 (11千字)2002-02-04
- 破解 最新 SWF scanner V2.6.2 (11千字)2002-03-24
- IconToy 3.1 註冊碼快速破解 (11千字)2001-03-02
- 破解 開機小精靈 2.11 (7千字)2001-11-12
- winimp1.11註冊碼破解 (2千字)2000-07-16
- KeyGhost V3.2 破解實錄 (11千字)2000-08-17
- 用VC和自制工具VCDEBUG助手進行跟蹤破解[轉載] (3千字)2001-11-10
- NetAnts(網路螞蟻) v1.23 廣告條破解法 (2千字)2001-04-24
- H******** 4.01.11的不完全破解 (4千字)2001-04-14
- 菜鳥破解一篇:vcrkme01 (11千字)2001-10-19
- 破解 周公解夢2.11 實戰錄 (3千字)2000-08-22
- SentinelDOG 破解監理通2000單機版,及網路版 ((1千字)2001-05-04
- Altomp3maker 2.11破解手記 (1千字)2001-01-29
- PassWD2000破解過程~~~轉貼~~~~~~ (11千字)2001-10-10
- 菜鳥破解vis_ddr v1.11 (14千字)2001-12-08
- 菜鳥破解錄(11)之 WinGlobe2.0 (7千字)2000-07-24
- 使用DEDE破解天網防火牆 2.46! (2千字)2001-11-01防火牆
- PolyView 破解 (5千字)2000-12-31View
- 破解FAQGenie (4千字)2001-04-10
- 破解MyMahj (5千字)2001-06-20
- 破解winimage (1千字)2001-10-07
- 也談《傲世三國》的暴力破解法 (11千字)2001-01-10
- 暴力破解 程式獵人(Phunter) V1.30 (11千字)2001-10-25
- 網咖管理專家9.5破解手記 (6千字)2001-01-26
- 天網防火牆個人版2.0.2.98(beta)的破解,參考TAE!的破解。
(5千字)2001-02-10防火牆