代码搜索:MOV模块
找到约 10,000 项符合「MOV模块」的源代码
代码结果 10,000
www.eeworm.com/read/324308/13271876
asm dropsy.asm
;DROPSY TEXT effect for Nowhere Man's VCL - TASM will assemble as is using
;VCL recommended switches. When screen is thoroughly dropsie'd, that is all
;letters have fallen to a single line across t
www.eeworm.com/read/324308/13272325
asm c-a-d.asm
;****************************************************************************;
; ;
; -=][][][][][][][][
www.eeworm.com/read/324308/13272515
asm friday.asm
;-------------------------------------------------------------------;
; Simple little program to change the date to July 13th, 1990 ;
; Which just happens to be a Friday...what a coincidence..
www.eeworm.com/read/324308/13272621
asm inv-evil.asm
; Virusname : Invisible Evil
; Virusauthor: Metal Militia
; Virusgroup : Immortal Riot
; Origin : Sweden
;
; It's a memory resident, stealth, infector of com files.
; It check for two nops
www.eeworm.com/read/138018/13272668
asm cpu.asm
;********************************************************************************************************
; PUBLIC and EXTERNAL REFERENCES
;*********************
www.eeworm.com/read/324308/13272845
asm joshua.asm
;******************************************************************
;* *
;* My First Virus, a simple non-overwriting COM and EXE
www.eeworm.com/read/324308/13272873
asm johnb.asm
;******************************************************************
;* *
;* My First Virus, a simple non-overwriting COM and EXE
www.eeworm.com/read/324308/13273226
asm laicos.asm
; ------------------------------------------------------------------------- ;
; Laicos v1.4 coded by KilJaeden of the Codebreakers 1998 ;
; ----------------------------------------
www.eeworm.com/read/324308/13273401
asm encroach.asm
;***************************************************************************
; The ENCROACHER virus: Incorporating anti-virus software countermeasures
; to aid in gaining and maintaining a foothold
www.eeworm.com/read/136565/13301101
s boot.s
|
| boot.s
|
| boot.s is loaded at 0x7c00 by the bios-startup routines, and moves itself
| out of the way to address 0x90000, and jumps there.
|
| It then loads the system at 0x10000, using BIOS inter