Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
局域网扫描/嗅探/反嗅探/欺骗/攻击程序 开发工具: Visual C++ 基于winpcap的网络扫描攻击程序,本程序通过ARP协议来实现各种功能,大部分网络攻击程序皆是采用此种方法.-LAN scan/sniff/anti-sniffer/cheat/exploit development tools: Visual C++ based on winpcap network scan attack program, this program through the ARP protocol to achieve a variety of functions, most of the network attack programs are both used this method.
Update : 2024-05-18 Size : 22528 Publisher : x5a4d

Malicious Cryptography. Excellent book on how to write cryptographic virii to attack systems. Malicious uses of cryptography.
Update : 2024-05-18 Size : 28277760 Publisher : Fei

DL : 0
n个皇后问题 在 n 行 n 列的国际象棋棋盘上,最多可布n个皇后。若两个皇后位于同一行、同一列、同一对角线上,则称为它们为互相攻击。 n皇后问题是指找到这 n 个皇后的互不攻击的布局。-n-Queens problem in n rows n columns of the chess board, up to n-Queens cloth. If the two Queens in the same row, same column, the same diagonal, then called them to attack each other. n queens problem is to find the n-queen not attack the layout of each other.
Update : 2024-05-18 Size : 2048 Publisher :

DL : 0
由于五子棋比一字棋难,规则多,又有禁手限制,无法采用简单的搜索和加分方式。 为了分清各种情况的轻重缓急,我们采用一次性打分的策略: 对棋盘上的每个空位根据情况的轻重缓急,越重越争分越高,反之越低,然后根据打分找出分值最高的的位置下子。 打分事实根据有:是否赢棋(最高),对方是否要赢棋,是否禁手,可形成四连的个数,和形成三连(包括活三)的个数,对方可可形成四连的个数,和形成三连(包括活三)的个数,等等。 本算法的好处在于,既有攻又有守,而且攻守较严。-Gobang difficult than chess because of the word, rules and more restrictions there are cut-off hand can not be a simple way of search and processing points. The advantage of this algorithm, both have defensive attack, but more stringent attack and defense.
Update : 2024-05-18 Size : 1418240 Publisher : 杨铭

DL : 0
对局域网的主机进行ARP的攻击,使其主机瘫痪,主要让初级同学实验.-Hosts on the LAN ARP attack to the host paralysis, mainly for primary students to experiment.
Update : 2024-05-18 Size : 2716672 Publisher : 许飞

DL : 0
T C P / I P (通常它是指传输控制协议/网际协议, Transmission Control Protocol/Internet Protocol)是发展至今最成功的通信协议,它被用于当今所构筑的最大的开放式网络系统I n t e r n e t之上就是其成功的明证。I n t e r n e t最初的设计是为了满足美国国防的需要,具体来讲就是使美国政府即使在遭受核打击时也能保证通信不间断, T C P / I P就是用于这个目的的。今天,I n t e r n e t已经发展得更加商业化,更加面向消费者,尽管基本目的发生了改变,但其最初的所有质量标准(也就是开放式、-TCP/IP (usually it refers to the Transmission Control Protocol/Internet Protocol, Transmission Control Protocol/Internet Protocol) is the most successful so far the development of communication protocols, which is used today by building the largest open network system that is above the I nternet proof of its success. I nternet was originally designed to meet U.S. defense needs, specifically the United States Government, even when subjected to nuclear attack can ensure uninterrupted communication, TCP/IP is used for this purpose. Today, I nternet has developed a more commercial, more consumer-oriented, while the basic purpose has changed, but its original quality standards for all (that is open, ...
Update : 2024-05-18 Size : 12632064 Publisher : 李晓

OtherQueen
DL : 0
n*n的棋盘上放置彼此不受攻击的n个皇后,按国际象棋规则可知:皇后可以攻击同行同列同斜线的棋子-n* n chessboard placed on each other from attack of the n-Queens, according to chess rules we can see: Queen can attack the peer-pawn with the column with a slash
Update : 2024-05-18 Size : 1024 Publisher : jdx

DL : 0
一本有关黑客攻防的电子书,讲解了黑客攻防的过程及一些黑客代码,适合入门-A book about a hacker attack and defense of the e-books, explained the process of a hacker attack and defense and some hackers code for entry-
Update : 2024-05-18 Size : 9290752 Publisher : 李宇宇

This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight with different strategies and algorithms of control. The results are positive for the construction of flying robots and a new generation of airplanes developed to the similarity of flying animals. Some highlights are given about the fist implemented architecture of the structure of a robotic bird. This platform consists on a body, wings and tail with actuators independently controlled though a microcontroller a radio transmission system and batteries are used in order to avoid wired connections between the computer and the robot.-This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight with different strategies and algorithms of control. The results are positive for the construction of flying robots and a new generation of airplanes developed to the similarity of flying animals. Some highlights are given about the fist implemented architecture of the structure of a robotic bird. This platform consists on a body, wings and tail with actuators independently controlled though a microcontroller a radio transmission system and batteries are used in order to avoid wired connections between the computer and the robot.
Update : 2024-05-18 Size : 369664 Publisher : MicaelSteel

Otherc1
DL : 0
c实现的缓冲区溢出攻击 介绍了如何用c语言实现缓冲区攻击-c realization of buffer overflow attacks describes how to use c language to achieve a buffer attack
Update : 2024-05-18 Size : 37888 Publisher : 王洋

dos code to implement dos attack
Update : 2024-05-18 Size : 3072 Publisher : thiru

DL : 0
[Linux防火墙].(Linux.Firewalls.Attack.Detection.and.Response.with.iptables,.psad,.and.fwsnort)(美)拉什.中文高清PDF版.pdf-[Linux Firewalls]. (Linux.Firewalls.Attack.Detection.and.Response.with.iptables,. Psad,. And.fwsnort) (U.S.) Rush. Chinese HD PDF version. Pdf
Update : 2024-05-18 Size : 25542656 Publisher : xiaohehe

DL : 0
apr局域网攻击 适合SOKET初学者学习-arp attack
Update : 2024-05-18 Size : 2043904 Publisher : galen

RFID2
DL : 0
RFID系统的IEEE的文章,安全协议,认证- In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three different types of protocol frame formats are formed by extending the ISO/IEC 18000-3 standard[3] for implementing the proposed authentication protocol in RFID system environment. The system has been described in Verilog HDL and also synthesized using Synopsys Design Compiler with Hynix 0.25 µ m standard-cell library. From implementation results, we found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.
Update : 2024-05-18 Size : 233472 Publisher : fxy

DL : 0
RSA低指数攻击程序,通过程序展示RSA低指数攻击的漏洞-Low-index attack on RSA program, through the RSA program showing a low index of vulnerability to attack
Update : 2024-05-18 Size : 4096 Publisher : honghong

DL : 0
误删除、误格式化、误克隆、分区表丢失、误分区、PQ分区出错、病毒破坏等..OUTLOOK、OUTLOOK EXPRESS、FOXMAIL、LOTUS NOTES等邮件系统Word、Excel、PPT等OFFICE文档修复及各种文件无法正常使用.. office办公文档损坏或乱码,文档闪存CF卡/智能媒体SM卡/MS记忆棒/MMC多媒体卡/SD卡/XD卡/U盘/MP3/MP4,故障类型有:U盘/存储卡等无法识别,无法完成格式化,数据误格式化,误删除,覆盖等... 邮件误删除格式化,dbx/PST损坏出错问题...OUTLOOK、OUTLOOK EXPRESS、FOXMAIL、LOTUS NOTES等邮件系统文件无法正常使用-Accidentally deleted, formatted wrong, wrong clone, the partition table is lost, misuse Division, PQ partition error, virus attack, etc. .. OUTLOOK, OUTLOOK EXPRESS, FOXMAIL, LOTUS NOTES and other e-mail system, Word, Excel, PPT, etc. repair and a variety of documents OFFICE file can not be normal use .. office office documents damaged or garbled, the document Flash CF Card/Smart Media SM Card/MS Memory Stick/MMC Multimedia Card/SD Card/XD Card/U Disk/MP3/MP4, fault types are: U disk/memory card is not recognized, unable to complete the format, data error formatting, accidentally deleted, coverage, etc. ... accidentally deleted e-mail format, dbx/PST corruption error problem ... OUTLOOK, OUTLOOK EXPRESS, FOXMAIL, LOTUS NOTES, etc. e-mail system files can not be normal use ..
Update : 2024-05-18 Size : 2979840 Publisher : 栾玉庆

sniffcomsole的源程序,对于黑客的攻防很有效果。-sniffcomsole the source, for a hacker attack and defense is effective.
Update : 2024-05-18 Size : 2388992 Publisher : dainel

DL : 0
易語言完美國際源碼顯示名字,打坐,普通,攻擊和撿取物品!-Yi language source code shows the name of Perfect International, meditation, common attack and seizure of items!
Update : 2024-05-18 Size : 164864 Publisher : 姚樂

DL : 0
八皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法-Eight queens problem is an old and well-known problem is a typical Example backtracking algorithms. The problem is that the nineteenth century, the famous mathematician Gauss in 1850: Under the 8X8 grid placed eight on the chess queen, so that it can not attack each other, that is, any two Queens can not be in the same row, same column or the same slash on, and asked how many kinds of facing France
Update : 2024-05-18 Size : 1024 Publisher : kimi

DL : 0
一个网页打字游戏,具有源代码 可直接去玩,具有分等级的攻能-Typing a web game to play with the source code can be directly with a sub-class of attack can be
Update : 2024-05-18 Size : 11264 Publisher : 石达开
« 1 2 ... 41 42 43 44 45 4647 48 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.