代码搜索:MOV模块

找到约 10,000 项符合「MOV模块」的源代码

代码结果 10,000
www.eeworm.com/read/324308/13271876

asm dropsy.asm

;DROPSY TEXT effect for Nowhere Man's VCL - TASM will assemble as is using ;VCL recommended switches. When screen is thoroughly dropsie'd, that is all ;letters have fallen to a single line across t
www.eeworm.com/read/324308/13272325

asm c-a-d.asm

;****************************************************************************; ; ; ; -=][][][][][][][][
www.eeworm.com/read/324308/13272515

asm friday.asm

;-------------------------------------------------------------------; ; Simple little program to change the date to July 13th, 1990 ; ; Which just happens to be a Friday...what a coincidence..
www.eeworm.com/read/324308/13272621

asm inv-evil.asm

; Virusname : Invisible Evil ; Virusauthor: Metal Militia ; Virusgroup : Immortal Riot ; Origin : Sweden ; ; It's a memory resident, stealth, infector of com files. ; It check for two nops
www.eeworm.com/read/138018/13272668

asm cpu.asm

;******************************************************************************************************** ; PUBLIC and EXTERNAL REFERENCES ;*********************
www.eeworm.com/read/324308/13272845

asm joshua.asm

;****************************************************************** ;* * ;* My First Virus, a simple non-overwriting COM and EXE
www.eeworm.com/read/324308/13272873

asm johnb.asm

;****************************************************************** ;* * ;* My First Virus, a simple non-overwriting COM and EXE
www.eeworm.com/read/324308/13273226

asm laicos.asm

; ------------------------------------------------------------------------- ; ; Laicos v1.4 coded by KilJaeden of the Codebreakers 1998 ; ; ----------------------------------------
www.eeworm.com/read/324308/13273401

asm encroach.asm

;*************************************************************************** ; The ENCROACHER virus: Incorporating anti-virus software countermeasures ; to aid in gaining and maintaining a foothold
www.eeworm.com/read/136565/13301101

s boot.s

| | boot.s | | boot.s is loaded at 0x7c00 by the bios-startup routines, and moves itself | out of the way to address 0x90000, and jumps there. | | It then loads the system at 0x10000, using BIOS inter