资源列表
smurf
- Smurf攻击是以最初发动这种攻击的程序名Smurf来命名。这种攻击方法结合使用了IP欺骗和ICMP回复方法使大量网络传输充斥目标系统,引起目标系统拒绝为正常系统进行服务。 -The name of the program Smurf Smurf attack in the initial launch such attacks to name. This attack method combined with the IP spoofing and the ICMP replies metho
DCT
- 通过MATLAB,基于图像变换域的信息隐藏源码-MATLAB, based on the information of the image transform domain hidden source
FileEncryptor
- file encryption in java
a51
- A5 algorithm implemented
PermutationOS.rar
- 对信息进行加密解密操作 设计换位密码 单表代替密码 维吉尼亚密码,Encryption and decryption of information designed to operate a single table instead of transposition password password password Virginia
5_attractor_sync1
- 采用主动-被动的同步方案实现两个具有5涡卷蔡氏混沌电路系统同步-By active- passive synchronization scheme to achieve the two Chua' s chaotic circuit with five scroll synchronization
a5
- A5算法是一种序列密码,它是欧洲GSM标准中规定的加密算法,用于数字蜂窝移动电话的加密,加密从用户设备到基站之间的链路。A5算法包括很多种,主要为A5/1和A5/2。其中,A5/1为强加密算法,适用于欧洲地区;A5/2为弱加密算法,适用于欧洲以外的地区。-The GSM encryption algorithm, A5, is not much good. Its effective key length is at most five bytes and anyone with the
c_rc4
- BLOCK加密,RC4算法,此算法简单实用, 供各网友免费学习和使用.-BLOCK encryption, RC4 algorithm, this algorithm is simple and practical for users to learn and use free of charge.
blowfish
- blowfilsh加解密c代码封装类库,直接调用BlowfishEncryption和BlowfishDecryption函数实现加解密过程。-blowfilsh encryption and decryption of c code encapsulation class library the direct to call BlowfishEncryption and BlowfishDecryption function of encryption and decryption proce
DES3
- 用C#写的3DES加解密算法,供大家参考-3DES encryption and decryption algorithms written in C#, for your reference
ajaxplorer_checkinstall_exec
- ajaxplorer2.6之前的版本所存在的漏洞利用-ajaxplorer2.6 previous version exists exploit
dataencrypt
- 该例程是与先前上传的解密程序配套的加密程序,完成16轮分组加密。-routines with the previous upload declassification procedures supporting the encryption process, completed a 16 encryption.
