Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
smurf攻击是很简单的,它有一些IP(广播地址)地址列表,发出了一些伪造的数 据包(ICMP echo request)从而导致一场广播风暴,可以使受害主机(使它成为伪造包 的源地址)崩溃。-smurf attack is very simple. It has some IP address list and can send pseudo ICMP echo request. As a result, broadcast storm will occur.
Update : 2008-10-13 Size : 3882 Publisher : 孙新

在Linux的ip包重组过程中有一个严重的漏洞。本程序利用此漏洞进行攻击-There is a serious leak during the process of the ip-pakege recombination of the Linux.This program can attack the Linux through the leak.
Update : 2008-10-13 Size : 3673 Publisher : 孙新

攻击一台Win95的机器。这是Win95的一个漏洞,以其IP地址和端口向自 己的同一个端口发起连接(发SYN),Win95即会崩溃。-attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port launched with a link (the SYN), Win95 will collapse.
Update : 2008-10-13 Size : 1673 Publisher : 孙新

一个通过TCP连接过多睹塞80端口的攻击器代码-one too many connections through TCP port 80 to see a Serbian attack on the code
Update : 2008-10-13 Size : 36538 Publisher : 深刻机

超级DDOS (分布式拒绝服务攻击)源码 ,每秒大于40000次-Super DDOS (Distributed Denial of Service Attack) source, more than 40,000 times per second
Update : 2008-10-13 Size : 5074 Publisher : ship

该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Update : 2008-10-13 Size : 1170077 Publisher : 大大

怪物追赶玩家 ,你 按下 ctrl 键可攻击怪物。 地图可以自由编辑-monster chasing players, you press the ctrl keys can attack a monster. Free Map Editor
Update : 2008-10-13 Size : 338236 Publisher : 张林

端口知识及攻击方法,包括公共端口,注册端口,动态端口,详细介绍了上百个端口的功能。-ports knowledge and attack methods, including public ports, registered ports, dynamic ports, detailing more than 100 ports function.
Update : 2008-10-13 Size : 8288 Publisher : 王松

DL : 0
自己写的一个截屏工具,可以像QQ那样进行截屏!-himself wrote a tool of attack, as it did for QQ screen shots!
Update : 2008-10-13 Size : 37111 Publisher : 吟风

aircrack is a 802.11 WEP key cracker. It implements the so-called Fluhrer - Mantin - Shamir (FMS) attack, along with some new attacks by a talented hacker named KoreK. When enough encrypted packets have been gathered, aircrack can almost instantly recover the WEP key.
Update : 2008-10-13 Size : 127624 Publisher : 張中原

一个扫雷游戏,用鼠标控制左击确定无雷,右击确定有雷,在右击取消有雷标记,刚开始用鼠标控制菜单,选者难度,及记录,开始游戏后按 F2返回菜单-a minesweeping games, with the left mouse control attack to determine mine-free, right click identified minefields in the right-to remove the minefields marked the beginning, with mouse control menu, the choices were difficult, and records of the games started by F2 to return to the menu
Update : 2008-10-13 Size : 5021 Publisher : 马硕

DL : 0
这是模拟物理中导弹打飞机现象的小程序。运行的时候需要把CCBP文件夹包含在头文件中。-This is the simulation of a missile attack against physics phenomena of small aircraft procedures. When run with the need to CCBP folder contains the first document.
Update : 2008-10-13 Size : 153004 Publisher : 梁晓军

目前的DDOS拒绝服务攻击大多都是SYN攻击,在这里给大家syn攻击的源码。-current DDOS denial of service attacks, most SYN attack, here we syn attack to the source.
Update : 2008-10-13 Size : 11675 Publisher : 飞机抗敌

一个由igmp攻击修改而来的icmp数据包攻击代码,对win98有效,主要是作为学习来看的-an attack by igmp adapted from the icmp packets attack code on win98 effective, as is the view of learning
Update : 2008-10-13 Size : 7780 Publisher : 就叫这

软件介绍: 本系统采用无数据库记录数据以及XMLHTML无刷新的“双无”技术对您的网站实行超级管理。只要将程序代码放入ASP网站或空间,所有浏览你网站的访问者行踪均在你的监视之下。你可以根据实际情况在后台对访问者进行友好或不友好的实时远程控制。 主要特点: 1、本系统采用无数据库记录数据技术:特点是不与网站其它程序冲突,记录的数据无遗漏。 2、XMLHTML无刷新技术:特点是访问者在瞬间会收到你发送的讯息或封锁、反攻击措施,而你的网站不会刷新。 -software introduced : the system by using data and database records updated XMLHTML no "double no" technology on your website implement Super management. If the code Add ASP website or space, all you browse the website visitors in your whereabouts were under surveillance. You can light of the actual situation in the background of visitors for a friendly or unfriendly to the real-time remote control. Main features : 1, the system uses no database records data technology : Features site is not other procedures conflict, the recorded data without omissions. 2, XMLHTML REFRESHING technology : features visitors will be received in an instant message you send or blockade, counter-attack, and you will not be updated.
Update : 2008-10-13 Size : 1554332 Publisher : 罗鲲

DL : 0
< 紧急下潜> 著名j2me手机游戏,本人开发. 游戏为经典潜艇军舰海战,玩家操纵军舰躲避潜艇攻击,并打击潜艇. 游戏程序含有通用的图片管理类库.可重用.-lt; Lt; Emergency dive gt; Gt; Famous J2ME mobile games, I development. Classic games for naval submarines, warships, players manipulate warships escape attack submarines, and combat submarines. Games containing GM's picture library management. Reusable.
Update : 2008-10-13 Size : 160030 Publisher : 王宁

2005最新黑客技术攻防教程 -latest hacking techniques 2005 Directory 2005 defense latest hacker attack and defense Guide
Update : 2008-10-13 Size : 1796339 Publisher : 杜飞

sql扫描加自动攻击工具Sqlpoke 含源代码.大家自己看看吧.-sql plus automatic scanning tool Sqlpoke attack with the source code. We all look at it.
Update : 2008-10-13 Size : 24995 Publisher : 刘强

RPG:又称动作(Act)RPG,这种RPG没有专门的战斗画面,也就是说随时可以挥刀挥剑。如日本《不可思议之谜宫• 风来的西林》、日本《天地创造》等等,也有主观视角的A• RPG,如美《魔法门》系列。-RPG : also known as the action (Act) RPG, RPG no special combat scenes is ready brandished a knife and sword attack. Japan "inconceivable mystery Palace # 8226; The wind-resistant, "Japan" will create ", and so on subjective perspective of A # 8226; RPG, such as the United States, "Quest" series.
Update : 2008-10-13 Size : 1390256 Publisher : 亚军

DL : 0
在 n 行 n 列的国际象棋棋盘上,最多可布n个皇后。 若两个皇后位于同一行、同一列、同一对角线上,则称为它们为互相攻击。 n皇后问题是指找到这 n 个皇后的互不攻击的布局。 n 行 n 列的棋盘上,主次对角线各有2n-1条。-n n trip out of the international chess board, the maximum n Queen's cloth. If two at the same Queen's visit, the same series on the same diagonal, as they attack each other. N Queen's problem is found n the Queen not to attack each other's layout. N n trip out on the chessboard, and secondary diagonal each 2n-1.
Update : 2008-10-13 Size : 1384 Publisher : 刘二
« 1 2 ... 8 9 10 11 12 1314 15 16 17 18 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.