Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
天那,大家都来看看小弟的作品都是好东东,算发难,但是程序简单-days, we have to look at the younger brother's works are good Dongdong, counting launched an attack, but simple
Update : 2008-10-13 Size : 7947 Publisher : 彭炳超

DL : 1
c#实现的屏幕和窗口截屏类,可截获屏幕外或被压盖的窗口-the window screen and type of attack can be intercepted or gland screen outside the window
Update : 2008-10-13 Size : 2088 Publisher : hehe

DL : 0
以前常用的攻击软件源代码,不过对于初学者还是具有很强的指导意义。-used before the attack software source code, but for a beginner or have a strong guiding significance.
Update : 2008-10-13 Size : 13635 Publisher : 黄羽翔

远程控制软件源代码,采用异步事件选择模型,截屏压缩传输等也具有参考价值。-remote control software source code, using asynchronous events choice model, compression and transmission of attack also with reference value.
Update : 2008-10-13 Size : 111317 Publisher : 陈海峰

DL : 0
鲨鱼攻击猎物游戏 是一个Applet程序,要在浏览器中或用appletviewer执行。当Applet运行时, 鲨鱼会在水平方向持续移动,单击相应的按钮会改变鲨鱼的运动方向。游戏的目标是当猎物 经过时,如果鲨鱼也处在该位置并且完全没入水中,则猎物才被捕获。猎物被捕获时会发出 相应的提示音,并且猎物消失。-shark attack prey is a game Applet procedures, and in a browser or appletviewer implementation. When the applet runs, sharks in the horizontal direction will be sustained mobile, click on the corresponding button will change the direction of the shark. The goal of the game when the game is through, if the sharks at the position and did not fully submerged, was captured prey. Prey to be arrested will be issued when appropriate tone and prey disappear.
Update : 2008-10-13 Size : 1126823 Publisher : pctd

DL : 0
信息隐藏检测与攻击技术研究!02年我的毕业设计,看看网上到处有人找,忍痛奉献。水印攻击代码,请勿用于非法用途!ABOUTUS(本软件可以检测一切基于空域隐藏的信息和一部分基于频域隐藏的信息,可以攻击目前绝大部分数字水印,特别独特的IBM攻击技术可以攻击目前所有的数字水印。)-information hiding and attack detection technology! 02, I graduated from the design, look at the Internet is full of people looking for and reluctantly dedication. Watermark attack code, do not for illegal purposes! ABOUTUS (The software can detect hidden airspace based on all the information and part is based on frequency domain hidden information, we can attack the majority of the current digital watermarking, unique special attack IBM technology can attack all current digital watermarking.)
Update : 2008-10-13 Size : 1735477 Publisher : 杨智丹

Tribe FloodNet 2k Distributed Denial Of Service Network 分布式拒绝服务工具的源代码,下面为英文说明: TFN can be seen as the yet most functional DoS attack tool with the best performance that is now almost impossible to detect. What is my point in releasing this? Let me assure you it isn t to harm people or companies. It is, however, to scare the heck out of everyone who does not care about systematically securing his system, because tools sophisticated as this one are out, currently being improved drastically, kept PRIVATE, and some of them not with the somewhat predictable functionality of Denial Of Service. It is time for everyone to wake up, and realize the worst scenario that could happen to him if he does not care enough about security issues. Therefore, this program is also designed to compile on a maximum number of various operating systems, to show that almost no modern operating system is specifically secure, including Windows, Solaris, most UNIX flavors and Linux. -Tribe FloodNet 2k Distributed Denial Of Se rvice Network Distributed denial of service tools source code for the English below : TFN can be seen as the most functional yet DoS att Ack tool with the best performance that is now al most impossible to detect. What is my point in re this leasing Let me assure you it isn t to harm peo ple or companies. It is, however, to scare the heck out of everyone who does not car e about systematically securing his system, because tools sophisticated as this one are out , currently being improved drastically. PRIVATE kept, and some of them not with the somewhat predictab le functionality of Denial Of Service. It is tim e for everyone to wake up. and realize the worst scenario that could Happe n to him if he does not care enough about security issues. There
Update : 2008-10-13 Size : 44662 Publisher : onlyu

通过程序介绍的一些算法,可以对信息隐藏技术实施攻击,特别是水印技术.-procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.
Update : 2008-10-13 Size : 3474 Publisher : 侯开浩

ERP 项目系统的流程图.无比重要的一击-ERP system flowchart. More important than an attack
Update : 2008-10-13 Size : 140313 Publisher : 范乙

DL : 0
开发环境:Windows XP+IIS5.1+ASP+Access2003 当前版本:T06N0100 登陆帐号: 非凡国度 登陆密码: 123456 下载地址: 繁体版:http://www.oneidc.cn/down/t06n0100_big5.rar 简体版:http://www.oneidc.cn/down/t06n0100.rar 1、江湖武器系统的优化;增加拳头、弓箭装备; 2、增加查看对方武器装备; 3、增加转生、进化功能; 4、增加宠物进化,进化后杀伤力加倍; 5、增加“武林秘籍”功能,提高攻击、防御、武功上限; 6、增加神龙攻击、龙粮商店功能; 7、增加聊天室魔法,更具娱乐性; 8、增加元气攻击; 9、增加组队; 10、增加怪兽功能、会员城堡; 11、增加亲亲卡、抱抱卡、猪崽卡、种子卡等; 12、增加护身神售; 13、增加新钓鱼系统; 14、全新的奖励系统,一键搞定; 15、怪物区(后台可以管理和修改参数); 16、各个栏目增加详细准确的帮助说明; 17、增加会员钻石系统系统 18、PK方式更换,增加对比属性; 默认管理员:非凡国度 管理密码:123456-development environment : Windows XP IIS5.1 ASP Access 2003 Current Version : T06N0100 landing Account : extraordinary country landing Password : 123456 download address : Traditional version : http : / / www.oneidc.cn/down/t06n0100_big5.rar English version : http : / / www.oneidc.cn/down/t06n0100.rar 1, quack weapons systems optimization; increased fists, arrows and equipment; 2, increasing to see each other weaponry; 3, increasing reincarnation, Evolutionary function; 4, increase pet evolution, evolution of mass destruction after doubling; 5, add "Wulin SECRET" functions, improving the attack and defense, powers ceiling; 6, the Shenlong increased attacks, Lung Function grain stores; 7, increased chat rooms magic, more entertainment; 8. increased vitality attacks; 9, increase te
Update : 2008-10-13 Size : 43287588 Publisher : 梦凡

DL : 0
数模转换,时钟显示,中断查询。 可攻初学者入门单片机编程 -ADC clock, interrupt inquiries. Beginners can attack entry Microcontroller
Update : 2008-10-13 Size : 2882 Publisher : 欧阳是

数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Update : 2008-10-13 Size : 563820 Publisher : 魏凯

DL : 0
这是一个集多种网络黑客工具于一体的软件!能够比较方便的进行几种简单的网络攻击!在局域网内测试通过!-This is a multi-network hackers tools in the integrated software! Compared to facilitate the conduct of several simple network attack! The LAN test pass!
Update : 2008-10-13 Size : 676693 Publisher : 操家庆

DL : 0
sql扫描加自动攻击工具 Sqlpoke-sql plus automatic scanning tool Sqlpoke attack
Update : 2008-10-13 Size : 17677 Publisher : feng

DL : 1
UDP洪水攻击程序源码.威力很大.不要拿它来作坏噢-UDP Flood attack procedure source. Powerful. Not bad for the staff to Oh
Update : 2008-10-13 Size : 3773 Publisher : 车军

这是一款基于Microsoft Windows 框架使用的开源安全扫描工具,可以用来检测系统安全漏洞和增强安全审计,可以生成详细的html、text和Nessus nsr 结果和攻击分析报告,支持CVE names、SecurityFocus、CERT、Snort、Nessus NASL等。内附源代码。-It is a Microsoft Windows-based framework for the use of open-source security scanning tools, Detection systems can be used for security vulnerabilities and strengthen security audit and can generate detailed html, text and Nessus NSR results and attack analysis, support CVE names, SecurityFocus, CERT, Snort, such as Nessus NASL. Enclosing the source code.
Update : 2008-10-13 Size : 2186379 Publisher : googolplex

实现图像的对数极坐标变换,具有旋转不变性,可用于数字水印的抗几何攻击-achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
Update : 2008-10-13 Size : 3432 Publisher : lhl1105

全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking Wilson help.
Update : 2008-10-13 Size : 520218 Publisher : 魏凯

Direct3D111.rar是我在光盘上考下来的攻大家参考一下-Direct3D111.rar is my test disc from the attack your reference
Update : 2008-10-13 Size : 57753 Publisher : 阿当

PIDTest123.rar是我在光盘上考下来的攻大家参考一下-PIDTest123.rar is my test disc from the attack your reference
Update : 2008-10-13 Size : 23210 Publisher : 阿当
« 1 2 ... 10 11 12 13 14 1516 17 18 19 20 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.