Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
WIVET is a benchmarking project that aims to statistically analyze web link extractors. In general, web application vulnerability scanners fall into this category. These VAs, given a URL(s), try to extract as many input vectors as possibly they can to increase the coverage of the attack surface. WIVET provides a good sum of input vectors to any extractor and presents the results. In order an input extractor to run meaningfully, it has to provide some kind of session handling, which nearly all of the decent crawlers do. -WIVET is a benchmarking project that aims to statistically analyze web link extractors. In general, web application vulnerability scanners fall into this category. These VAs, given a URL(s), try to extract as many input vectors as possibly they can to increase the coverage of the attack surface. WIVET provides a good sum of input vectors to any extractor and presents the results. In order an input extractor to run meaningfully, it has to provide some kind of session handling, which nearly all of the decent crawlers do.
Update : 2024-05-19 Size : 248832 Publisher : sogetthis

DL : 0
包括了非常有用和详尽的芯片级解密的方法.(英文版)-the file includes lot of method to attack the die of silicon chip
Update : 2024-05-19 Size : 11499520 Publisher : sam

ARP攻击程序ARP攻击实现程序,实现ARp的攻击的C++源程序代码-arp attack realize procedures realize Arp attacks C++ Source code
Update : 2024-05-19 Size : 62464 Publisher : luda

DL : 0
在c++ builder上的黑客攻防,详细讲解黑客软件的制作。-In the c++ builder on the hacker attack and defense, explain in detail the production of software hackers.
Update : 2024-05-19 Size : 9292800 Publisher :

计算机入侵检测技术专著 1. 实现安全系统架构 2. 满足清晰和一致的安全需求 3. 最大化地优化安全系统-Attacks on the nation’s computer infrastructures are a serious problem. Over the past 12 years, the growing number of computer security incidents on the Internet has reflected the growth of the Internet itself. Because most deployed computer systems are vulnerable to attack, intrusion detection (ID) is a rapidly developing field. Intrusion detection is an important technology business sector as well as an active area of research.
Update : 2024-05-19 Size : 1077248 Publisher : bill sun

这是一个关于信息安全类的资料,有关于我们不知道的攻击知识。-This is a type of information on information security, there is an attack on the knowledge we do not know.
Update : 2024-05-19 Size : 2831360 Publisher : 朱龙

DL : 0
这是一款CC攻击器的源码.网络上流传应该很少吧.拿给需要的人.不过这种软件还是少做的好呵呵.网络安全第一-This is a CC attack on the source device. Networks should rarely spread bar. Showed people in need. However, such software or do less good Hehe. Network security first
Update : 2024-05-19 Size : 25600 Publisher : 西红柿

DL : 0
对DES的Rectangle攻击和Boomerang攻击-Rectangle Attack on DES, and the Boomerang Attack
Update : 2024-05-19 Size : 428032 Publisher : lhc

写安全的代码,此书阐述了代码安全的必要性,着重讲述了如何写安全的代码,以防止各种各样的攻击。-Until recently few people have cared about secure systems.This book both involved in convincing and teaching people how to make their applications secure from attack.
Update : 2024-05-19 Size : 2134016 Publisher : dai

robot attack based on the classic arcade game of the 80s
Update : 2024-05-19 Size : 14336 Publisher : elpolodiablo76

DL : 0
丝路英雄攻击力计算器 支持所有版本.易语言源代码-slyx
Update : 2024-05-19 Size : 83968 Publisher : testname

皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法-Queens problem is an old and well-known problem is a typical Example backtracking algorithms. The problem is that the nineteenth century, the famous mathematician Gauss in 1850: Under the 8X8 grid placed eight on the chess queen, so that it can not attack each other, that is, any two Queens can not be in the same row, same column or the same slash on, and asked how many kinds of facing France
Update : 2024-05-19 Size : 5120 Publisher : 王蕾

DL : 0
以网格作为逻辑结构,具有高联通,低负载,扩展性强的特点。经分析表明,该方案更高效、安全、抗攻击能力更强。-To the grid as a logical structure, with high Unicom, low load, expansion and strong features. The analysis shows that the program more efficient, safe, stronger anti-attack capability.
Update : 2024-05-19 Size : 193536 Publisher : 张伟

多线程DDos攻击C源代码,Visual Studio 2005平台已测-DDos attack on multi-threaded C source code, Visual Studio 2005 platform has been measured
Update : 2024-05-19 Size : 2417664 Publisher : zf

DL : 0
运用流体力学数值计算软件对有头部攻角的弹丸气动性能进行了数值计算, 分析了有头部攻角弹 丸周围流场和作用在弹丸表面的空气动力. -The use of numerical fluid dynamics software to have the head of the projectile angle of attack aerodynamic performance of the numerical calculation, analysis of a head attack angle shot and the role of the flow field around the surface of the projectile aerodynamics.
Update : 2024-05-19 Size : 229376 Publisher : 王顺红

利用弹簧近似和网格重构相结合的非结构动网格技术,耦合求解 Euler方程及弹道方程,模拟飞行在 46千 米高空、0°攻角、马赫数6.5、壳片分离初速分别为 6mPs ,12mPs、壳片分离角速度分别为 0°/s ,50°/s ,150°/s的子母弹 抛壳动态过程。-The use of spring approximation and mesh reconstruction of a combination of non-structural dynamic grid technology, coupled equations for solving Euler equations and ballistics, flight simulation at 46 km altitude, 0 ° angle of attack, Mach 6.5, the shell-chip separation velocity, respectively 6mPs , 12mPs, angular separation of the shell pieces were 0 °/s, 50 °/s, 150 °/s of the cluster bombs thrown shell dynamic process.
Update : 2024-05-19 Size : 471040 Publisher : 王顺红

在现代操作系统中,引入了一个重要的概念,那就是进程。引入进程的目的是使程序能够正确地并发执行,进程存在的唯一标志是进程控制块。 在分时系统中,导致创建进程的典型事件是用户登录,在批处理系统中,导致创建进程的典型事件是作业调度,有系统专门为运行中的应用进程创建新进程的事件是提供服务,在创建进程过程中,有调度程序为进程分配CPU不是创建所必需的。 从执行状态转变为活动就绪,如果由于终端用户的请求而暂时停止下来,则它的状态应转变为静止就绪,如果由于得不到所申请的资源而暂时停止下来,则它的状态应转变为活动阻塞。在进程的状态转换中,阻塞到执行一般不可能发生 ,就绪到阻塞肯定不可能发生。 我们如果为每个作业只建立一个进程,则为了照顾短作业用户应采用短作业优先调度算法,为了照顾紧急作业用户应采用基于优先权的剥夺调度算法,为能实现人机交互,应采用时间片轮转法,而能使短作业、长作业和交互作业用户都满意的是多级反馈队列调度算法。进程调度算法中,平均相应时间最短的算法是时间片轮转算法,最容易引起进程长时间等待的是抢占式静态优先权算法。 -Parallel job scheduler is important to High Performance Computing system. The kernel function is to choose a job to execute whenever a scheduling event happens. The simplest policy is FCFS. This approach suffers from low system utilization. EASY Backfilling[4]was proposed to improve system utilization and has been implemented in several production schedulers. The main problem with EASY is that it requires estimates of job runtimes to be available. Another problem is that it moves forwards as many smaller jobs as possible. It is unfair to the larger ones. To attack these problems, we propose a new method, Priority-based Preemptive Scheduling.
Update : 2024-05-19 Size : 230400 Publisher : 杜军衔

DL : 0
公钥密码RSA ① 通过实际编程掌握非对称密码算法RSA的加密和解密以及快速加、解密过程,加深对非对称密码算法的认识。 ② 实现对RSA的解密密钥攻击。 -Public-Key Cryptography RSA ① through practical programming in non-asymmetric cryptographic algorithm RSA encryption and decryption as well as rapid encryption and decryption process, to deepen understanding of asymmetric cryptographic algorithm. ② realize RSA decryption key attack.
Update : 2024-05-19 Size : 37888 Publisher : scorpio

DL : 0
E269.Net会员管理系统 功能简介: 1. 可设置会员按等级访问不同的页面,或取消 2. 可设置打开注册会员,或暂停注册会员 3. 会员可自由修改自己的注册资料 4. 会员可通过注册资料找回登录密码 5. 可设置为需要管理员审核后,会员才能登录,或取消审核 6. 管理员后台可搜索、修改、删除、锁定会员 7. 会员密码MD5加密,防SQL注入攻击,防跨站攻击,防数据库下载 8. 代码优化,可兼容性很强,安全高效,简单易用 管理员名:e269net 密码:e269net -E269.Net Member Management System Function Description: 1. Can be set according to class members access to a different page, or cancellation of 2. Can be set to open registered members, or suspend the registration of members 3. Members are free to modify their registration information 4. Members can retrieve registration information through the login password 5. Can be set to require administrators to audit, the members can log on, or cancellation review 6. The administrator back to search, modify, delete, lock member 7. Member MD5 password encryption, anti-SQL injection attacks, cross-site attack prevention, anti-Database downloads 8. Code optimization, compatibility strong, safe and effective, easy to use Manager Name: e269net Password: e269net
Update : 2024-05-19 Size : 51200 Publisher : zhujunjie

DL : 0
单击游戏“坦克大战”,实现坦克的四处移动,打击敌人。-Click the game " Battle City" and realize tanks move around to attack the enemy.
Update : 2024-05-19 Size : 12288 Publisher : 宫越
« 1 2 ... 43 44 45 46 47 4849 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.