搜索资源列表
PHPTXT
- PHP+TXT站点管理系统0.5版--相当稳定版系统特点: 1\无需数据库支持,不存在注入与攻击. 2\数据以文件夹方式存储,无限分类,无限记录条数. 3\支持多语言,多模板,自定义变量,信息页自定义项. 4\支持伪地址,灵活定义地址参数. 5\运用国际流行的SMARTY技术,参数可调. 6\模板自定义编辑,不同类型可以交叉调用. 7\友情链接自定义,自定义CSS风格. 8\一键修复所有数据结构。 9\读写分流技术,不会造成数据丢失。 10\更多功能等待您
sniffer49_50
- 嗅探器,sniffer,网络编程 网络攻击与防御-Sniffer, sniffer, network programming network attack and defense, and so on
patchwork_wangying
- 利用matlab实现Patchwork算法,包括各种处理攻击-Using matlab Patchwork algorithm, including the attack of various treatment
Hash--and-watermarking
- 基于hash算法与信息安全,数字水印的嵌入和数字水印的攻击方法-Based on hash algorithm and information security, digital watermarking embedding and the attack methods of digital watermarking
2
- 黑客攻防实战入门_邓吉.rar随书下载材料 关于网络安全的书-Hackers attack introduction to combat DengJi _. Rar download material with books
MonoAudioConvert
- Object-C 单声道音频合成 单声道,振荡器模块 双振荡器 方形,三角形,锯齿,反向锯齿波 倍频选择,支持5个八度 音符间滑行(滞处理器) 振荡器细齿(多个倍频程) 振荡器同步 低通滤波器模块 调制模块 tremelo/ WAVE 颤音/硬沥青 过滤 包络发生器模块 支持的ADSR(攻击,衰减,保持,释放) 体积 滤波器(低通滤波器的数量)-Object-C mono audio synthesis Features
RSA
- RSA公钥加密算法是1977年由Ron Rivest、Adi Shamirh和LenAdleman在(美国麻省理工学院)开发的。RSA取名来自开发他们三者的名字。RSA是目前最有影响力的公钥加密算法,它能够抵抗到目前为止已知的所有密码攻击,已被ISO推荐为公钥数据加密标准。RSA算法基于一个十分简单的数论事实:将两个大素数相乘十分容易,但那时想要对其乘积进行因式分解却极其困难,因此可以将乘积公开作为加密密钥。-The RSA public key encryption algorithm in
chi-square
- This statistical attack of stego image - chi square analysis
shizi
- 这是一个易语言写的十字斩技能改全屏攻击的源码-This is an easy language to write the cross cut skills to full screen attack source
zhiwu
- 植物大战僵尸辅助源码,有强大的修改植物攻击力,無CD功能,还有修改阳光,修改金钱-Plants vs Zombies source, the number of chocolate to modify the attack power of plants, to modify the number of small game off, modify the sun, modify, money, modify
sql-injection
- web安全测试之SQL注入测试攻击,主要为前台攻击-SQL injection of the attack at the front desk
QBufferAttack
- Q版缓冲区溢出攻击 Q Buffer Over Flow attack-Q Buffer Over Flow attack
56
- 黑天使多线程攻击器2.0,很不错的易语言源码,适合易语言爱好者使用。-Black Angel multi-threaded attack 2.0, very good and easy language source code for easy language enthusiasts.
1xy7z.ZIP
- 防窃听攻击的安全网络编码Eavesdropping proof attack on secure network coding-Eavesdropping proof attack on secure network coding
id3
- ID3-IDS is an algorithm based on of ID3 to Web attack detection. Even though simple, ID3 is suffcient to put apart a number of Web attacks, including a large proportion of their variants. It also surpasses existing methods.-ID3-IDS is an algorith
DWT
- 本程序应用于基于DWT变换的数字水印技术,包含了嵌入、提取及攻击过程。-This procedure applied to the digital watermarking technique based on DWT, including the process of embedding, and attack.
attacks
- 数字水印攻击代码,用于水印嵌入后对嵌入水印的图像进行攻击-Digital watermarking attack code the attack on the watermarked image for watermark embedding
Trajectory-simulation-program
- 以下是有关弹道方面的一些仿真程序,有关次专业的同僚可一起探讨,为中华之强胜而奋斗 附件包括: 1、战术导弹导弹弹道仿真程序 2、攻击垂直机动目标比例导引三维弹道仿真 3、空地导弹弹道仿真程序 4、倾斜平面三点法攻击机动目标弹道仿真程序-The following is the ballistic aspects of the simulation program, and related sub-professional colleagues can exp
07bfe2ddafa0
- 一个比较好用的ARP攻击程序,C++写成的,可编译通过运行之,值得一试。-An easy to use ARP attack programs, C + + written, can be compiled by running the, worth a try.
war
- 战争模拟器:对战双方分别为防守方和进攻方,共有两种对战模式即金钱模式和人数模式,可供选择的兵种有弓箭手、骑兵、步兵,各兵种的血值、攻击力、暴击、移动速度等属性各不相同,因此在战争中的作用和能力各不相同。以此,来简单地模拟战争场景。-War simulator: Battle between the defensive side and offensive side, there are two Battle Mode that money mode and the number of modes