Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
Linux黑客大曝光,详细介绍了黑客攻击linux操作系统的各种手段-Linux Hacking exposed details of a hacker attack linux operating system, a variety of means to
Update : 2024-05-05 Size : 20423680 Publisher : haoyue

黑客攻击与防范 黑客常用的攻击步骤可以说变幻莫测,但纵观其整个攻击过程,还是有一定规律可循的,一般可以分:攻击前奏、实施攻击、巩固控制、继续深入几个过程。 目前比较流行的网络级安全防范措施是使用专业防火墙+入侵检测系统(IDS)为企业内部网络构筑一道安全屏障。防火墙可以有效地阻止有害数据的通过,而IDS 则主要用于有害数据的分析和发现,它是防火墙功能的延续。2者联动,可及时发现并减缓DoS、DDoS 攻击,减轻攻击所造成的损失。-Hackers attack and to prevent common hacker attacks can be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally can be divided into: attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion detection systems (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad data, while the IDS is mainly used for bad data analysis and discovery, which is a continuation of the firewall functionality. 2 person interaction, they can promptly detect and mitigate DoS, DDoS attacks, to reduce the losses caused by attacks.
Update : 2024-05-05 Size : 14336 Publisher : jhp627

DL : 0
udp flood denial of service attack progam which will flood the victim ip address and port until you stop it makes your connection lag
Update : 2024-05-05 Size : 4096 Publisher : shitbreak

DL : 0
循环 1,窗口置前 2,模拟TAB键(需要等待sleep) 3,模拟1键普通攻击 4,攻击等待(1000毫秒) //这里是上节课的模拟按键打怪的代码 HWND hwnd hwnd=::FindWindow(NULL,"Element Client") //窗口置前 ::ShowWindow(hwnd,SW_RESTORE) ::SetForegroundWindow(hwnd) //模拟1这个按键。 keybd_event(49,0,WM_KEYDOWN,0) //按下1 keybd_event(49,0,WM_KEYUP,0) 这里需要将WM_KEYUP事件改成KEYEVENTF_KEYUP事件-Cycle 1, windows home before 2, analog TAB key (need to wait for sleep) 3, simulate an attack on four key general attack wait (1000 milliseconds)// This is the analog buttons on the lesson Daguai code HWND hwnd hwnd =:: FindWindow (NULL, " Element Client" ) // set the window before the:: ShowWindow (hwnd, SW_RESTORE) :: SetForegroundWindow (hwnd) // simulate one of this key. keybd_event (49,0, WM_KEYDOWN, 0) // pressed 1 keybd_event (49,0, WM_KEYUP, 0) here WM_KEYUP event needs to be replaced by KEYEVENTF_KEYUP Event
Update : 2024-05-05 Size : 1872896 Publisher : jeffchang

OtherLSB
DL : 0
本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
Update : 2024-05-05 Size : 1024 Publisher : 张敏

ARP attack,在一个局域网内攻击的小程序-ARP attack, at a LAN attack applet
Update : 2024-05-05 Size : 2512896 Publisher : SS

DL : 0
In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight. In this model, a bird flies by the wind beat motion or using its tail down. The results are positive for the construction of flying robots. The development of computational simulation based on the dynamic of the robotic bird that should allow testing strategies and algorithms of control.
Update : 2024-05-05 Size : 474112 Publisher : MicaelSteel

穷举法。整钱零找的算法 例如100元可以换出几个10元 几个20元 几个5元-Brute force attack. The whole zero-finding algorithm such as money, 100 yuan to 10 yuan for a few number of 20 yuan a few 5 yuan
Update : 2024-05-05 Size : 2048 Publisher : 张超

CCNP\ccnp课件\ISCW\5.消除网络攻击\攻击工具\MAC地址泛洪\dsniffer\BerkeleyDB-0.27.tar.gz-CCNP \ ccnp courseware \ ISCW \ 5. To eliminate network attacks, \ attack tools \ MAC address flooding \ dsniffer \ BerkeleyDB-0.27.tar.gz
Update : 2024-05-05 Size : 155648 Publisher : 刘政

DL : 0
本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility, the extracted watermark image and the original watermark image are basically the same, anti-attack and strong.
Update : 2024-05-05 Size : 1024 Publisher : liuyuan

Matlab Function of Collusion Attack
Update : 2024-05-05 Size : 7168 Publisher : john

network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Update : 2024-05-05 Size : 26624 Publisher : Balaji

network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Update : 2024-05-05 Size : 20480 Publisher : Balaji

network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Update : 2024-05-05 Size : 37888 Publisher : Balaji

DL : 0
sending intrusion detection for A wireless Intrusion detection system and a new attack model
Update : 2024-05-05 Size : 3072 Publisher : naresh

Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Update : 2024-05-05 Size : 346112 Publisher : vinay

DL : 0
Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requires Voicebox for matlab.
Update : 2024-05-05 Size : 1024 Publisher : Francesco

DL : 1
ARP攻击包检测代码,获取局域网中的ARP报文,分析是否为攻击报文-Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
Update : 2024-05-05 Size : 3072 Publisher : 阮清强

VC/MFCDOS
DL : 0
文章列表: 1,DOS系统的安装 2,恢复误删文件--DOS命令应用实例(一) 3,合并VCD片断、快速删除文件夹--DOS命令应用实例(二) 4,低格、分区、高格的应对--DOS命令应用实例(三) 5,清除CMOS密码--DOS命令应用实例(四) 6,一劳永逸--批处理命令(一) 7,让CIH永不发作--批处理命令(二) 8,巧设开机密码等--批处理命令(三) 9,DOS经典软件 10,DOS经典游戏-List of articles: 1, DOS system installation 2, restore mistakenly deleted files- DOS Command Applications (1) 3, the merger VCD clips, quick delete folders- DOS Command Applications (2) 4, low-grid, zoning, high-cell responses- DOS Command Applications (3) 5, clear the CMOS password- DOS Command Applications (4) 6, once and for all- a batch command (1) 7, so that CIH never attack- a batch command (2) 8, Qiao-based power-on password, etc.- a batch command (3) 9, DOS classic software 10, DOS Classics
Update : 2024-05-05 Size : 585728 Publisher : zhangxuechao

this a paper on minimizing cache timing attack on aes using cache flushing algorithm-this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
Update : 2024-05-05 Size : 1011712 Publisher : akshay
« 1 2 3 4 5 67 8 9 10 11 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.