Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
一些病毒会劫持应用程序,同样USBCleaner也成为了病毒攻击的对象.如果是病毒引起的,双击USBCleaner主程序一般就没有任何反应. 解决方法: 将USBCleaner.exe改成989.exe等其他随机的名称,一般就可以绕过映象劫持了. 另外如果放置USBCleaner的文件夹也被关闭,将文件名中USBCleaner字样改成其他名字,就可以了. -Some viruses hijack the application, the same USBCleaner the virus has become the object of attack. If it is caused by a virus, double-click USBCleaner in general there is no reaction to the main program. Workaround: USBCleaner.exe into other random 989.exe name, and generally can be hijacked to bypass the image. Also, if a folder to place USBCleaner was closed, the file name USBCleaner words into other names, they do.
Update : 2024-05-18 Size : 3654656 Publisher : 蓝星

水印攻击测试程序optimark。 这个比stirmark更全面测试水印程序,很好用-Watermark attack test program optimark. This more comprehensive test than stirmark watermark program, very good use
Update : 2024-05-18 Size : 1466368 Publisher : 张庆

modsecurity是linux环境下非常优秀的开源防御web攻击软件,它可以防御针对apache的攻击,使用规则匹配,它的解码流程和匹配流程是很值得学习和借鉴。-modsecurity is a very good linux environment, open source software, Defense web attacks, it can be defensive attack against apache, using the rules match, its decoding process and matching process is very worthy of study and reference.
Update : 2024-05-18 Size : 1252352 Publisher : 林可可

DL : 0
摘   要:根据高维混沌系统具有更高安全性的特点 ,提出一种基于统一混沌系统和广义猫映射的 彩色图像加密新算法。该算法先利用广义猫映射分别实现空域彩色图像三基色置乱变换 ,然后由统 一混沌系统输出的三维混沌序列分别实现空域彩色图像三基色逐像素替代变换。研究结果表明 ,该 算法具有良好的像素值混淆、 扩散性能和较大的抵抗强力攻击的密钥空间 ,加密图像像素值具有类随 机均匀分布特性 ,且相邻像素的值具有零相关特性 ,证明了所提出方案具有较高的安全性-Abstract: According t o the characteristic of higher secrecy of high2 di mensi on chaotic system, a new col our i mage encryp ti on algorithm based on unified chaotic system and general cat map s was p r oposed . Firstly, tricol or scrambling transformati on was realized respectively in s pace domain by using the general cat map s . Then the three chaotic sequences of unified chaotic system were adop ted t o realize the tricol or Substituti on transformati on p ixel by p ixel . The results demonstrate that the algorithm has good p roperties of confusi on and diffusi on . The key space is large enough t o resist the brute2 force attack . For the encryp ted i mage the distributi on of p ixel2 values has a random2like behavi or and the values of adjacent p ixels satisfy zero correlati on, showing that the p r oposed scheme is of high security . Key words: col our i mage encryp ti on unified chaotic system general catmap tricol or scrambling
Update : 2024-05-18 Size : 567296 Publisher : ff

DL : 0
MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then data hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a watermarking system for MP3 files. Any opponent can uncompress the bit stream and recompress it this will delete the hidden information -- actually this is the only attack we know yet -- but at the expense of severe quality loss.-MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then data hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a watermarking system for MP3 files. Any opponent can uncompress the bit stream and recompress it this will delete the hidden information-- actually this is the only attack we know yet-- but at the expense of severe quality loss.
Update : 2024-05-18 Size : 346112 Publisher : ahmed salem

DL : 0
很强大的一个网站攻击器,于11月18日作者放弃此程序放出源码,目前程序的版本是4.5版本. 这程序是w123zh制作的一个黑客工具,攻击方面也不错,希望大家可以继续发展此程序-Very powerful device attack on a website on November 18 by release source code to give up this program, the current program version is version 4.5. W123zh This program is produced by a hacker tool, an attacker also good, hope we can continue to develop this program ! !
Update : 2024-05-18 Size : 50176 Publisher : 事实上

DL : 0
ARP attack on Linux enviroment
Update : 2024-05-18 Size : 5120 Publisher : SS

In the connected world of the Internet, a few malicious individuals can translate into major network security concerns for administrators with systems exposed to public networks. The recent denial of service attacks on many of the web s most popular sites makes this clearer than ever before. Many of these attacks generate large volumes of TCP/IP traffic. Commonly the targeted site may seem unavailable to the broader Internet because of the saturation of its network segment. Internally, however, the web servers may hardly seem affected by the attack
Update : 2024-05-18 Size : 26624 Publisher : 魏春雨

DL : 0
一个使用greedy search算法实现的N个queen排列的程序。用星号代表国际象棋中的queen。随机生成布局后,显示每次移动,最后使queen不能互相攻击。即都不在相同的行,列和对角线。-A greedy search algorithm using the N-a queen arranged procedure. Behalf of the international chess with an asterisk in the queen. Randomly generated layout, display each move, the final result is queen can not attack each other. That is not in the same row, column and diagonal.
Update : 2024-05-18 Size : 12288 Publisher : 刘洋

DL : 0
黑客攻防入门书籍 很好很强大 讲了各种攻击方法-Getting Started with a very good offensive and defensive hacking books, talk about a variety of very strong attack methods
Update : 2024-05-18 Size : 539648 Publisher : yangxinying

DL : 1
在VC++6.0环境下用OPENGL实现了海战场的目标攻击模拟。本程序包括3DMax文件加载,显示;船尾焰绘制等一系列海战场环境的必须元素的绘制和现实源代码。希望对进行这方面研究的人提供帮组。-In VC++6.0 environment to achieve a sea battle with the OPENGL target attack simulation. This process includes 3DMax file loading, display stern flame drawing a series of sea battlefield environment must be drawn and realistic elements in the source code. Want to study in this area to provide help groups.
Update : 2024-05-18 Size : 18255872 Publisher : zihuizhang

DL : 0
机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions
Update : 2024-05-18 Size : 1024 Publisher : zhangjianli

机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Update : 2024-05-18 Size : 12288 Publisher : zhangjianli

DL : 0
机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Update : 2024-05-18 Size : 1024 Publisher : zhangjianli

机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Update : 2024-05-18 Size : 1024 Publisher : zhangjianli

机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Update : 2024-05-18 Size : 3072 Publisher : zhangjianli

机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Update : 2024-05-18 Size : 1024 Publisher : zhangjianli

用C++实现的arp攻击的源代码,代码清晰易懂。-Implemented with C++ source code arp attack
Update : 2024-05-18 Size : 301056 Publisher : flq

C++实现的arp攻击的源代码,里面有详细的文档说明-C++ implementation of the arp attack the source code, which detailed documentation
Update : 2024-05-18 Size : 3806208 Publisher : flq

DL : 0
arp攻击软件,可完全定义所发送的每一字节 使用了winpcap-arp attack software can be completely defined by sending each byte using the winpcap
Update : 2024-05-18 Size : 51200 Publisher : 周杰伦
« 1 2 ... 40 41 42 43 44 4546 47 48 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.