搜索资源列表
Rootkit-in-Android
- 随着android手机的普及,针对android手机的攻击也逐渐增加,本论文着重研究了rootkit对android手机的攻击方式-With the popularity of android phone, android phone for attacks is also increasing, this paper focuses on study of a rootkit attack on the android phone
event_sync
- This program is to calculate the synchronous activity between eeg signal during epileptic attack
Eight_Queens
- 八皇后问题,是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。 高斯认为有76种方案。1854年在柏林的象棋杂志上不同的作者发表了40种不同的解,后来有人用图论的方法解出92种结果。计算机发明后,有多种方法可以解决此问题。-The eight queens problem is an ancient and famous, is a
Cryptanalysis-INCrypt32-of-iCLASS
- Cryptanalysis of INCrypt32 in HID s iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han Category / Keywords: secret-key cryptography / INCrypt32, HID s iCLASS, RFID, reverse engineering, chosen message at
blackhole.pdf
- simulation of black hole attack in ns2
Ping-of-Death
- 死亡之PING攻击器生成器,鉴于网络上流传的各种死亡之PING程序或代码都存在各种各样的问题,特制作这个小软件,可以正常使用-Death PING attack generated, in view of the death of the PING program or code circulating on the network there are a variety of problems, especially to produce this software can be used n
aes_mini_project
- It is encryption and decryption algorithm. AES is a symmetric encryption algorithm processing data in block of 128 bits.Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same s
B---Hacker-Attack
- Book about the world of Hackers and Crackers, interesting information about it.
Analysis-on-Calling-the-Lib
- 首先介绍缓冲区溢出机制和基于缓冲区溢出的攻击形式,从C程序员的角度讨论了三类常用的库函数在调用时可能引发的安全问题,并详细分析了缓冲区溢出的内在原因及可能被利用的攻击方法。如果在编程时能针对这些库函数的调用有意识地采取应对措施,无疑将减少缓冲区溢出漏洞,提高程序的安全性能。- Firstly the paper introduces buffer overflow and the potential attack based on it, then from the view of a C pr
lanqiu
- 在LED灯上显示节数,单节时间,进攻时间~能用按键控制时间的暂停和开始-The LED lamp on the display section number, single time, time to attack ~ can use the keys to control the time of the pause and start
UdpAttack
- udp 泛洪攻击vc++源码,visual studi新建控制台程序编译即可-udp Pan Hung attack vc++ source code, Visual studi new console application compiled to...
attack_module
- 本程序主要用于在NS2平台下对与认知无线电中频谱融合下得拜占庭攻击问题进行的仿真-This procedure is mainly used for fusion and cognitive radio spectrum under the Byzantine attack the problem of simulation in NS2 platform
JavaGameSource3
- 攻打星球的小游戏源码,java语言编写,不是手机游戏-To attack the planet the game source code, java language, not a cell phone game
myArp
- 可以进行简单的arp攻击,winpcap的简单运用。适合编程新手参考-Simple arp attack, the winpcap the simple to use. Suitable for novice programmers reference
DNFOPEN
- DNF辅助:武器倍攻、超级防御、变态加速、满血蓝、超级称号、超级评分、清理牛桩、一刀秒杀一个、城镇飞机-DNF auxiliary: weapons-fold attack, super defense, abnormal acceleration, full of blood, blue, super title, Super score clean up the cow pile, a knife spike a town aircraft
king
- 问题的提出:八皇后是个古老而有趣的游戏,是由高斯于1850年首先提出的。 要求在国际象棋的棋盘上放置八个皇后,使其不能相互攻击,即任意两个皇后不能处于 棋盘的同一行、同一列和同一条对角线上。试问有多少种放法?-The problem: the eight queens is an old and interesting game, is first proposed by Gauss in 1850. To place eight Queen on the chess board s
WepCrack0.9.2.tar
- WEP破解源代码相关,可用于WLAN入侵检测的实验中作为参考数据研究wep attack and WLAN intrusion detection-wep attack and WLAN intrusion detection
PETools
- The dedicated electronic hardware unit or audio software used to apply compression is called a compressor. Compressors often have attack and release-The dedicated electronic hardware unit or audio software used to apply compression is called a compre
Remote-File-Inclusion-Attacks
- this doc talk about how to attack a network system remotly very good document in how to learn hackers mechanism and protect your networks againts hacking
(Linux.Firewalls.Attack
- LINUX下的防火墙iptables相关知识和资料。内涵介绍,基本功能,以及高级的配置知识。-LINUX firewall iptables-related knowledge and information. Connotation, the basic functions and advanced configuration knowledge.