搜索资源列表
sendmail漏洞攻击程序C源代码
- sendmail漏洞攻击程序-sendmail vulnerability to attack procedures
以前常用的攻击软件源代码
- 以前常用的攻击软件源代码-used before the attack software source code
c源码常用攻击程序
- C源码:常用攻击程序-C source : Attack procedures
攻击程序
- 攻击一台Win95的机器。这是Win95的一个漏洞,以其IP地址和端口向自 己的同一个端口发起连接-attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port with a link launched
Networkoffensive
- 针对常见的针对网络信息保密性的攻击方法的防御-against the common view of network information confidential nature of the ways to attack the defense
jitter
- performs jitter attack (removal/duplication) of rows or columns on a PGM gray-scale image -performs jitter attack (removal / duplica tion) of rows or columns on a PGM gray-scale imag e
8huanghou
- 八皇后问题是一个古老而著名的问题。这个问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。高斯认为有76种方案。1854年在柏林的象棋杂志上不同的作者发表了40种不同的解,后来有人用图论的方法解出92种结果。例如: 0 0 0 0 0 0 0
6DOF
- 导弹六自由度仿真模型,并且仿真了导弹攻击一个匀速直线运动的目标的过程-missile six degree-of-freedom simulation model and simulation of a missile attack on a uniform linear motion of the target
wmzs
- 可自动辅助打怪,加红兰,将攻击技能放于F1中,红药放于F7,兰药于F8,-be automatic backups Daguai, Hung Lan will attack skills or in F1, or in drug-F7, F8 Portland in medicine,
adhi
- 国际象棋中,如果把八个皇后放到8*8的国际象棋棋盘上 ,并且使得任何两个皇后之间都不能互相攻击,请问一共有多少种方法,你能把这些方法找出来吗? -international chess, if the Queen's decentralization 8 8 8 * The International Chess chessboard, and makes between any two Queen's not attack each other, ask a number of
jiaxajw
- 国际象棋中,如果把八个皇后放到8*8的国际象棋棋盘上 ,并且使得任何两个皇后之间都不能互相攻击,请问一共有多少种方法,你能把这些方法找出来吗?-international chess, if the Queen's decentralization 8 8 8 * The International Chess chessboard, and makes between any two Queen's not attack each other, ask a number of
land
- ip land attack by msdos
attack
- 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。
DESCrack
- DES查分攻击源代码,包含DES算法的实现以及DES密码的查分攻击。-DES check points attacks source code contains the DES algorithm realization of the investigation DES-attack.
Smurf
- smurf攻击是很简单的,它有一些IP(广播地址)地址列表,发出了一些伪造的数 据包(ICMP echo request)从而导致一场广播风暴,可以使受害主机(使它成为伪造包 的源地址)崩溃。-enormously attack is very simple, it has some IP (radio address) address list, issued some fake data packets (ICMP echo request) resulting broadcast stor
doscarsh
- 著名的DOS攻击源码,老外网上搜的-famous DOS attack source, the foreigner found online
IDEA
- IDEA (International Data Encryption Algorithm) Data Encryption Algorithm by famous Chinese scholars and password Jiaboshi experts James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-at
wuziqi
- 五子棋小游戏#include<stdlib.h> #include<time.h> #include<stdio.h> #include<conio.h> int chess[169]={0} /*棋盘*/ struct chess_t/*作为辅助,即是作为建意*/ { char attack /*攻防用的,0表示守,1表示攻*/ int j /*作为优先级用*/ }chess_a[169]
bishops
- A bishop is a piece used in the game of chess which is played on a board of square grids. A bishop can only move diagonally from its current position and two bishops attack each other if one is on the path of the other. In the following figure, the d
ch18
- 本目录下存放了演示web应用安全技术的例程序,具体用法如下: 1.attack目录是演示JSP安全性漏洞及对策的web应用程序,可以直接部署到应用服务器并运行。 2.security目录下存放演示保护web资源的例程序,tomcat子目录下存放可以在tomcat下运行的web应用程序(security目录)及在 tomcat下配置安全域的配置文件样例(配置文件目录), weblogic子目录存放可以在weblogic下运行的web应用程序。