Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
网络syn Flood攻击的代码,需要的下载。本程序通过使用Winsock2原始套接字提供函数sendto(),手动构造TCP SYN帧,对目标主机进行SYN Flood攻击。-Network syn Flood attack code needed to download. This procedure by using raw socket to provide Winsock2 function sendto (), Manual TCP SYN frame structure on the target host for SYN Flood attacks.
Update : 2024-05-05 Size : 2048 Publisher : 许凡

针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的 P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息 熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有 效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任 关系。 -View of the current large-scale P2P systems can not effectively deal with malicious nodes to attack the problem, the paper presents a new risk assessment based on credibility and trust model of P2P system, the model taking into account the impact of the dynamic behavior of nodes trust the calculation of uncertainty, the introduction of risk factors, and to make use of information entropy theory to quantify the risks, will be the degree of trust between the entities and trust uncertainty unified. Simulation and analysis show that the trust model can effectively identify the malicious node, compared to some of the existing trust model to a greater extent to improve the system the rate of successful transactions, you can make between nodes more effectively to establish a relationship of trust.
Update : 2024-05-05 Size : 97280 Publisher : 刘峰

Waveletdft
DL : 0
基于dft的水印代码,水印注入、提取、防攻击测试-DFT-based watermarking code, watermark injection, extraction, anti-attack test
Update : 2024-05-05 Size : 356352 Publisher : wjp

SYN攻击代码,是在linux下运行的,大家可以从这个例子学习,但不要利用此代码去攻击别人-SYN attack code is running under linux, we can learn from this example, but do not use this code to attack other people
Update : 2024-05-05 Size : 4096 Publisher : chenkang

DL : 0
一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
Update : 2024-05-05 Size : 10240 Publisher : chenxeifong

DL : 0
DCT域数字水印源代码.水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。--DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking XDJM help.--
Update : 2024-05-05 Size : 1024 Publisher : 摩罗逊

DL : 0
本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题. 主要内容: 二次攻击[Second attack] 类型1:通过文件系统函数漏洞转换 类型2:通过SQL注射漏洞转换 类型3:通过正则表达式中转变量 类型4:通过编码/解码中转变量 数组变量的魅力 Code与系统 Code与http协议 漏洞挖掘 -This article focused on retaining some web security code hidden in comparison, programmers easily overlooked. Main elements: the second attack [Second attack] type 1: the file system function through the loopholes in the conversion type 2: Adoption of SQL injection vulnerabilities conversion type 3: regular expressions transit through the variable type 4: Adoption of encoding/decoding interim array variable variable the charm of Code and System Code loophole mining agreement with the http
Update : 2024-05-05 Size : 32768 Publisher : buzhidao

OtherDDoS
DL : 0
相信大家都一定不会对这两个这个词感到陌生,是的,拒绝服务攻击(Denial of Service),以及分布式拒绝服务攻击(Distributed Denial of Service)。 -I believe that everybody will not be the word of these two strangers, yes, denial of service attacks (Denial of Service), as well as distributed denial of service attack (Distributed Denial of Service).
Update : 2024-05-05 Size : 3072 Publisher : yjian

DL : 0
基于matlab做的数字水印,文件包括源代码及原图像和加入水印后的图像,经过测试,能有效抗攻击-Matlab-based digital watermarking so that the document includes the source code and the original image and adding a watermark image, tested and effective anti-attack
Update : 2024-05-05 Size : 759808 Publisher : 张伟

DL : 0
缓冲区溢出,对网络攻击程序,应该使用入侵检测工具坚持是否真的实现了攻击目的-Buffer overflow attacks on the network procedures, the use of intrusion detection tools should adhere to really achieve the purpose of the attack
Update : 2024-05-05 Size : 1024 Publisher : 莫松成

西工大程序设计大赛作品 拿出来与大家分享 含完整工作日记 历史备分 源代码及注释 RPG(role-playing game,角色扮演类游戏) 战斗用菜单操作:一级菜单有两项,attack(一般攻击),magic(使用魔法);当选magic后会出现第二级菜单,heal(治疗),magicattack(魔法攻击)。-Design Competition西工大procedure works out to share with you with a complete history of the work diary Backup Note the source code and RPG (role-playing game, role-playing games) fighting operation using the menu: a menu, there are two, attack (general attack ), magic (using magic) elected after magic there will be a second-class menu, heal (treatment), magicattack (magic attack).
Update : 2024-05-05 Size : 37888 Publisher : 王赫

DL : 0
c++ 的 DDOS攻击服务器源代码,完整,可编译。自己写个客户端就可以用-c++ the DDOS attack server source code, complete, and can be compiled. Write their own client can use
Update : 2024-05-05 Size : 26624 Publisher : 雨轩

实现水印嵌入,提取水印和对图像进行jpeg攻击-The realization of watermark embedding, watermark extraction and image jpeg attack
Update : 2024-05-05 Size : 1024 Publisher : jjj

DL : 0
DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益-DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
Update : 2024-05-05 Size : 31744 Publisher : WLL

DL : 0
数字水印技术攻击试验,实现噪声、滤波、剪切、压缩、旋转攻击-Digital Watermarking attack test, realize noise, filtering, shear, compression, rotation attack
Update : 2024-05-05 Size : 3072 Publisher : 王江

缓冲区溢出攻击,一个简单的漏洞,可以利用整形数传值给字符常量的溢出进行攻击-Buffer overflow attacks, a simple loophole, we can use plastic value give the number of characters spill constant attack
Update : 2024-05-05 Size : 452608 Publisher : cd

stirmark是一款数字水印攻击测试软件,很实用的软件!-checkmark is a digital watermarking attack testing software, very useful software!
Update : 2024-05-05 Size : 6780928 Publisher : lee

DL : 0
linux下模拟udp的泛洪攻击,类似trinoo和udp flooder-udp dos attack
Update : 2024-05-05 Size : 1024 Publisher : delta

Robocode是2001年7月在美国IBM 的Web alphaWorks上发布的坦克机器人战斗仿真引擎。与通常玩的游戏不同的是:参赛者必须利用对机器人进行编程,给机器人设计智能来自动指挥它,而不是由键盘、鼠标简单地直接控制。Robocode是一种有趣的竞赛性编程,使用几行简单的代码,就能够让你创建一个活生生的机器人,一个真正的在屏幕上与其他机器人互相对抗的机器人。你可以看到它在屏幕上四处疾驰,碾碎一切挡道的东西。机器人配有雷达与火炮,选手在躲避对手进攻的同时攻击对手,以此来较量得分的多少。Robocode可以让你在娱乐的同时学习与提高Java技术。-Robocode are in July 2001 at the United States on IBM s Web alphaWorks released fighting robot simulation engine tanks. PLAYING the game and usually are different: the participants must use to program the robot to the design of intelligent robot to automatically command it, and not by the keyboard, mouse, easy to direct control. Robocode is a fun competition of programming, easy to use a few lines of code, we can let you create a living robot, a true up at the screen with other robot robot confrontation with each other. You can see it everywhere on the screen galloped all the way crushing things. Robot is equipped with radar and artillery, attack rival players at the same time to avoid attack opponents in order to contest the number of points. Robocode allows you entertainment at the same time enhance Java technology with the study.
Update : 2024-05-05 Size : 3834880 Publisher : jushf

DL : 0
DDoS attack stie and you counld not use to attack any site
Update : 2024-05-05 Size : 1024 Publisher : thesun
« 1 2 3 45 6 7 8 9 10 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.