搜索资源列表
Excel08
- VCL Delphi using to attack Excel
Excel04
- Attack Excel with delphi (VCL)
DSDV.tar
- mplementing Route Cache Poisoning Attack in DSDV Protocol
arp_spoof
- 对目标主机进行arp攻击,使用C语言环境-Arp attack on the target host, using the C language environment
ccc
- 基于CUSUM的自适应攻击检测.Adaptive CUSUM-based attack detection.-Adaptive CUSUM-based attack detection.
WebServerSecurity
- Web server security:introductio to man-in-the-middle attack
DNFduxiebeigong
- 稳定倍攻源码,非常爽,非常稳定,非常奔放啊!-Stable source of attack times, very cool, very stable, very bold ah!
G-Attack
- 远程控制,服务端以及客服端,完美版。拿去即可使用,-Remote control. Screen control. Keyboard health. Perfect source
arp-attack-solution
- arp攻击解决方案从影响网络连接通畅的方式来看,ARP欺骗分为二种,一种是对路由器ARP表的欺骗;另一种是对内网PC的网关欺骗。-arp attacks from affecting network connectivity solutions to smooth the way of view, ARP spoofing is divided into two kinds, one is cheating the router ARP table the other is the inter
you-xiang-kou-li-gong-ji
- 邮箱口令攻击系统的程序源码,用VC++编写,属于黑客攻击口令的范畴-E-mail Password attack system source code, written with VC++, belongs to the scope of hacking password
Combat2010
- 基于三国的回合战斗系统,里面分战士,法师,大师三类,每类有每类的特殊攻击方式,里面也有选择攻击方式的特殊算法,喜欢的朋友可以下载-Three of the round based combat system, which divided the soldiers, Master, master of three categories, each category of each class has a special attack, which also selectively attack s
internetofLinux
- linux网络编程,包含socket编程,能够很好的说明网络攻防与监控的编程知识。-linux network programming, including socket programming, can be a good descr iption of the network attack and defense and control of programming knowledge. 允许输入拉丁字符的拼音
WirelessAODV
- Wireless Attacks Demo with Attack Removal
watermark
- 用matlab编写的数字音频水印算法,包括嵌入、攻击、提取-Using matlab digital audio watermarking algorithms, including embedding, attack, extraction
TankWarGame3.0
- 基于JAVA语言——坦克大战。本设计的主要实现功能是让用户坦克能随意移动并攻击目标,敌人坦克能寻址攻击用户坦克或主基地。-JAVA-based language- Battle City. The design of the main function is to allow users to achieve tank is able to move and attack target, attack enemy tanks capable of addressing the main tank
Network-and-system-training
- 本次培训内容覆盖目前大部分网络安全与防御知识,本课程详细讲述了网络安全与系统安全的各个概要,具体不想说,本人亲手制作,如有问题,请各位大侠一一指出,谢谢! 1、网络安全概述 2、导致网络安全问题的原因 3、网络安全特性 4、影响网络安全的主要因素 5、黑客常用攻击手段分析6、网络安全工具 7、网络安全防护建议 8、个人以及操作系统安全-The training covers most of the current networ
zhuabao
- 英文名称为Sniffer,中文可以翻译为嗅探器,是一种威胁性极大的被动攻击工具。使用这种工具,可以监视网络的状态、数据流动情况以及网络上传输的信息。当信息以明文的形式在网络上传输时,便可以使用网络监听的方式来进行攻击。-English name is Sniffer, sniffer Chinese can be translated as, is a threat of great passive attack tools. Using this tool, you can monitor t
N-queen-problem
- 在N*N的方格棋盘放置了N个皇后,使得它们不相互攻击(即任意2个皇后不允许处在同一排,同一列,也不允许处在与棋盘边框成45角的斜线上。 你的任务是,对于给定的N,求出有多少种合法的放置方法。 -In N* N checkerboard of placed N a queen, so they don t attack each other (that is, any two queen not allowed in the same row, the same listed, and n
fangyudaodan
- 防御导弹的代码 某国为了防御敌国的导弹袭击,发展出一种导弹拦截系统。但是这种导弹拦截系统有一个缺陷:虽然它的第一发炮弹能够达到任意的高度,但是以后每一发炮弹都不能高于前一发的高度。某天,雷达捕捉到敌国的导弹来袭。由于该系统还在使用阶段,所以只有一套系统,因此有可能不能拦截所有的导弹。-Code missile defense A country to defend against enemy missile attacks, to develop a missile defense s
bahuanghou
- 八皇后:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。-8 queens: in 8 X8 s international chess placed on eight queen, to make it can t attack each other, that is, any two queen not at all with one line, one and the same column or the same