Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
The Goblin and the Butterfly ,开源的2d游戏客户端-TThe Goblin and the Butterfly game server is up and running, so you can log into the game and have a look at the existing features. Here are some key features of "The Goblin and the Butterfly": · 5 Skills available, attack, defense, magic, harvesting and manufacturing · A PK (Player Kill) map is in game · Storage feature, deposit your items there tprotect them · Creatures in game, agressive and non agressive · Armor and weapons available · NPC s, stationary ones and moving ones · Chat system, local chat, channel chat, personal messages · In game mails for communicating with offline players · Day and night feature, individual light setting for inside maps · 2D open source client and artwork · In game online help · Newbie helpers, Moderators and Admins features implemented · Limited resources with moving locations Requirements: · SDL What s New in This Release: [ read full changelog ] · Jo s farm+ farm animals implemented · changed the keyboard handling, hopfully
Update : 2024-05-18 Size : 2022400 Publisher : edward

strong password based attack
Update : 2024-05-18 Size : 48128 Publisher : shrinivas

深入分析SQL注入攻击及安全防范,从数据库安全管理员的角度对现在一些比较流行的攻击方法和防范方法进行分析-Depth analysis of the SQL injection attacks and security precautions, security administrator from a database point of view of the attacks are now some of the more popular method of analysis and prevention methods
Update : 2024-05-18 Size : 173056 Publisher : YY

IRP攻击的例子。程序基于winpcap sdk实现,打包中提供了所需的头文件、lib库及dll。-IRP attack example. Program is based on winpcap sdk implementation, packaged to provide the required header files, lib libraries and dll.
Update : 2024-05-18 Size : 262144 Publisher : gaoguanghai

有名的握手协议洪水攻击的源代码,有待改进-The famous handshake protocol Flood attack the source code, room for improvement in
Update : 2024-05-18 Size : 2048 Publisher : luming

本书详尽描述了网络核心技术内幕——网络攻击秘航笈。通过该书的学习,您将掌握网络管理的内核。-<The network kernel techniques-network attack tricks> It s a detailed textbook for the kernel network knowlege. From this book you may become a master for network safety.
Update : 2024-05-18 Size : 26807296 Publisher : 王强

过所有杀软的免杀下载者,如果满意的话可以找我定制,禁止使用于非法用途,否则后果自负-don t use it for attack
Update : 2024-05-18 Size : 7168 Publisher : 陈炳灿

arp攻击相关内容资料 相当好的参考资料 -arp attack on the content of the information related to a very good reference
Update : 2024-05-18 Size : 156672 Publisher : bj

network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Update : 2024-05-18 Size : 6144 Publisher : Balaji

network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Update : 2024-05-18 Size : 17408 Publisher : Balaji

network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Update : 2024-05-18 Size : 2048 Publisher : Balaji

DL : 0
该游戏是用VC++6.0开发,实现船上放鱼雷,对水下的潜艇,进行攻击的游戏。该游戏采用对话框的形式来实现。-The game is developed using VC++6.0 to achieve the torpedo boat put on the underwater submarines, attack of the game. Using the dialog box in the form of the game to achieve.
Update : 2024-05-18 Size : 3556352 Publisher : programmer

DL : 1
用Flex builder建立工程,使用flash AS3完成的一个小型游戏,用方向键控制主角移动,一共有3波敌人的进攻,没波敌人被杀完后,下一波会出现。展示了简单的AI和flash as3图像编程的方法,其中封装了sprite类,非常容易理解。-The establishment of projects with the Flex builder, using flash AS3 completion of a mini-game, use the arrow keys to control the characters movement, a total of three waves the enemy' s attack, no wave of the enemy killed and exhausted, the next wave will appear. Shows a simple AI and flash as3 graphics programming method, which encapsulates the sprite class, very easy to understand.
Update : 2024-05-18 Size : 670720 Publisher : 史泽寰

You battle with a monster in which you can attack, defend, or heal. Uses random numbers to decide the attack and healing ammounts. Have fun!
Update : 2024-05-18 Size : 2048 Publisher : dudo

DL : 0
笑话网页小偷程序特点: ·无需购买服务器即可让你瞬间拥有数千部免费在线观看的卡通动漫资源; ·实现网站内容免更新免维护,全站后台管理,操作简单,管理方便; ·实现前台与后台完全分离,可自定义后台管理路径!支持在任意目录下使用; ·提供防SQL注入及跨站脚本攻击功能,确保程序更加安全; ·提供多个站点广告位并可在后台直接管理,轻松赚钱原来如此简单; ·提供站长工具包,轻松获取常用工具,助你一臂之力; -Joke thief program website features: * No need to purchase a server can let you instantly have thousands of free online viewing of the cartoon animation resources * Free update website content to achieve maintenance-free, full-stop admin, simple operation, easy management * To achieve complete separation of foreground and background can be customized Admin Path! To support the use of any directory Provide Anti-SQL injection and cross-site scripting attack function, ensure that procedures are more secure Provide multiple sites advertising and can be directly managed in the background, the original so simple to make easy money Provide owners kit, easy access to frequently used tools to help you a helping hand
Update : 2024-05-18 Size : 17408 Publisher : 方小杰

DL : 0
Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Update : 2024-05-18 Size : 207872 Publisher : vinay

Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Update : 2024-05-18 Size : 199680 Publisher : vinay

vb 获取网卡mac地址。membrane attack complex-membrane attack complex
Update : 2024-05-18 Size : 2048 Publisher : dt

硬盘终结者是由蔬菜工作室出品的一款极其恶性的硬盘炸弹程序,它是WIN32 PE程 序,因为用了VxD技术,所以能在Windows环境中直接写硬盘扇区,而无需象其它同类软 件一样要等待重启时进行破坏。 本软件可以直接运行于Windows环境中,运行后立即进行破坏,不会显示任何界面 ,它会从硬盘第一物理扇区(0柱0面1扇区)开始,向其中写入内存垃圾数据(与CIH发作 相同,呵呵~~~其实就是从CIH学来的^_^)。 -Hard Terminator is a vegetable studio buy one very vicious drive a bomb program, which is the WIN32 PE program because it uses VxD technology, they are able to write directly in the Windows environment, the hard disk sectors, without, like other similar software, like have to wait for restart to derail it. The software can run on Windows environment, run immediately after destruction, does not show any interface, it will first physical sector from the hard drive (0 column 0 plane a sector), the first to write to the memory garbage data ( CIH attack with the same,呵呵~ ~ ~ in fact learned from the CIH' s ^_^)。
Update : 2024-05-18 Size : 8192 Publisher : sadasd

DL : 0
a watermarking attack is an attack on disk encryption methods
Update : 2024-05-18 Size : 483328 Publisher : alex
« 1 2 ... 42 43 44 45 46 4748 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.