搜索资源列表
audiowatermark
- 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
sjzd
- 多线成手机炸弹,连续攻击,只到对方手机死机,请误做坏事!-Multi-line phone into a bomb, continuous attacks, only to crash each other s cell phone, please do bad mistake!
No.Starch.Press.Hacking.The.Art.Of.Exploitation.eB
- This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 我记得好像
QQSSRC
- QQ闪烁攻击器SRC 针对qq2008beta2版有效 其他没测试过-QQ flashing attacks browser version SRC effective against other qq2008beta2 not tested
DWT
- 代码利用DWT算法实现了电子水印技术。 其中包括了水印的插入,提取,以及4种不同的攻击。最后,测量了psnr-This algorithm describe digital watermark algorithm by using DWT. It implements embedding, extraction, and 4 different attacks. in the end, it measures psnr
eightqueens
- 用 Scheme 来解决八皇后问题。八皇后问题:在 8*8 的棋盘上放置彼此不受攻击的 8 个皇后。按照国际象棋的规 则皇 后可以攻击与之处在同一行或同一列或同意斜线上的棋子。找出所有合法的 使8 个皇后 彼此不受攻击的放置方法。1 )除了完成 queens 的定义之外 , 给出一个打印输出过程 print-queens-Scheme used to solve the problem of the eight Queen' s. 8 Queen' s problem: In the
aircrack-ng-1.0-rc3.tar
- Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attac
wep_network_attack
- wep无线网络的破解,详细介绍了用BT3系统进行对搜索到arp的网络攻击,获取网络密码-wep crack wireless networks, described in detail with BT3 system arp on the search network attacks, network access password
pyloris-2.3
- PyLoris is a tool for testing a web server s vulnerability to Denial of Service (DoS) attacks. It uses the Slowloris method by using all available connections web servers cannot complete valid requests. Supports SOCKS, SSL, and all HTTP request metho
StirMarkBenchmark_4_0_129
- 对图像进行攻击的的程序。旋转,切割,非常好用-Attacks on the image process. Very good
c1
- c实现的缓冲区溢出攻击 介绍了如何用c语言实现缓冲区攻击-c realization of buffer overflow attacks describes how to use c language to achieve a buffer attack
MS08-067
- MS08067病毒分析.RPC服务攻击.-MS08067-virus analysis. RPC service attacks.
e269nethy
- E269.Net会员管理系统 功能简介: 1. 可设置会员按等级访问不同的页面,或取消 2. 可设置打开注册会员,或暂停注册会员 3. 会员可自由修改自己的注册资料 4. 会员可通过注册资料找回登录密码 5. 可设置为需要管理员审核后,会员才能登录,或取消审核 6. 管理员后台可搜索、修改、删除、锁定会员 7. 会员密码MD5加密,防SQL注入攻击,防跨站攻击,防数据库下载 8. 代码优化,可兼容性很强,安全高效,简单易用 管理员名:e269net
softhy146I
- 1.楼房网系列.NET开源软件; 2.所有查询系统遵循OPOT设计模式(ONE PAGE,ONE TEMPLATE:一个页面,一个模板),便于修改和二次开发; 3.CAR技术(COPY AND RUN:复制即可运行),不需安装立即使用; 4.防止SQL注入攻击;-1. Building network series. NET open source software 2. All the search system to follow OPOT design patterns (O
DCT
- 一个实用的DCT数字图像水印程序,可以直接运行,包括很多攻击类型以及图片-A practical digital image watermark DCT procedure can run, including many types of attacks, as well as pictures
WebHacking
- Addison.Wesley Web.Hacking.-Attacks.and.Defence.rar
080868B
- 可信计算技术在防钓鱼攻击中的应用 徐 锐,王震宇,康新振 (解放军信息工程大学信息工程学院,郑州 450002) 摘 要:钓鱼攻击手段的多样性及其攻击后果的严重性给用户身份信息等私密数据的管理带来巨大威胁。该文分析了当今主要几类钓鱼攻击的手段,剖析其攻击原理,并在分析比较现有的几种密钥保护机制的特点的基础上,将可信计算技术与安全套接字相结合,提出一种抵御钓鱼攻击的方法。根据钓鱼攻击的特点,进行了安全性能分析,表明其能有效抵御钓鱼攻击。 关键词:可信计算;钓鱼攻击;证书;密钥-Ap
phone
- 手机攻击器,恶意攻击别人是不道德的. 本程序可能会造成被攻击者的反感. 甚至部分功可能会引起被攻击者的电话 损坏,请使用者注意后果. 凡是使用本程序造成的任何后果程序作 者不承担任何责任.-Mobile device attacks, malicious attack others is immoral. This procedure may result in the attacker' s offensive. Even some of the
Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a
- Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system coo
Attacks
- Check mark Attacks for watermarking
