搜索资源列表
tdifw-1.4.4
- TDI-based Open Source Personal Firewall (TdiFw) 一个开源的个人防火墙,精巧易用,具备强大的过滤功能 源码在src目录。 程序在Bin目录,执行根目录下的批处理文件也可以,具体步骤如下: 1. 运行install.bat 2. 根据你机器的配置情况,编辑%SystemRoot%\\system32\\drivers\\etc\\tdifw.conf配置文件 3. 重新启动计算机 版本:1-TDI-b
ARQlay
- 此文件为计算机网络的ARQ协议算法,希望对大家有所帮助!-this document to the computer network ARQ protocol algorithm, we want to help!
fhqydmvc
- 用Visual C++编写的计算机防火墙源代码,不错,强烈推荐 -with Visual C's computer firewall source code, it is true that a strong recommendation
NetKeep
- 一個用Delphi 寫的服務程序,可以知道是誰在訪問我的電腦,非常好-a written service procedures, can know who I visited in the computer, very good
shujubaobuhuoVB
- 数据包捕获,网络安全的一部分,能实现对计算机安全的检测-data packet capture and network security part, able to detect the computer security
200404171642527898
- 防火墙的远代码。它能实现对数据的过滤,能检测出局域网的网络IP地址。能够防止别的计算机ping本机。-firewall code. It can achieve the filtering of data, can detect LAN network IP addresses. To prevent other computer ping the machine.
soft0280
- 我们自己的作品,希望可以在大家的帮且慢下有进一步的提高,也能为计算机的软件事业,作一点应有的贡献.-our own works, I can help you in a minute under the further improvement, but also to computer software, should make a contribution.
WebMon
- 用于检验局域网内的网卡处于混杂模式的主机,维护网络安全-it is the software for checking the network card in the LAN and the host computer which is in the jam,protecting the security of the net.
yuancheng.rar
- 注册版“远控王”的受控端不会被杀毒软件查杀,可以穿越网络防火墙。试用版的受控端会被杀毒软件当作是病毒查杀。如果对方或者自己办公室电脑里装有杀毒软件,当你在办公室电脑里运行“受控端”或者发送给对方运行时,杀毒软件就会禁止“受控端”文件的运行,你当然就不能实施控制了,而购买的版本不会被杀毒软件当做病毒查杀,保证受控端能正常运行。 ,Register edition of " Remote Control King" controlled client will not be ki
2008-MS08-067
- ms08067漏洞远程溢出代码,已测试可用,最新版,在远程电脑上开4444端口,只是感觉shellcode略差,如能反连可避过防火墙,看看哪位牛人愿意修改一下-ms08067 remote overflow vulnerability code, have been tested is available, the latest version, the remote computer to open 4444 port, only slightly worse Shellcode feel i
firewall
- 专业味十足的一款防火墙软件,用VB语言开发,保护你的计算机安全。可以限定规则,适合监视应用程序及网络端口的功能。-The full flavor of a professional firewall using VB language development, the protection of your computer security. Can define the rules for application and network monitoring functions of the
Fanghuojiang
- 主要实现计算机安全,这是我的老师编的,让我们来参考的,看看对大家有没有帮助-The main achievement of computer security, this is for my teacher, and let us reference to see if there any help for all of us
[_Process_1876044122005
- 一个防火墙编程的好例程。该防火墙决定哪个进程可以在你的计算机上运行,当一个新进程被检测到得时候,它提示你是否通过,如果10秒内你没有理会它,它就自动地阻止,等等功能见英文介绍吧。-Process gateway is basically a firewall for processes. It allows you to choose which processes you want to allow to run on your computer. When a new processes i
QQPrier.TK
- 有效防止不良交友、网络诈骗、泄露公司机密、*、暴力等聊天行为!软件会在电脑开机后自动在后台隐藏运行监控所有MSN聊天记录! 第一次打开本软件时防火墙或-Effectively prevent the undesirable friends, network fraud, leaking company secrets, sex, violence and other acts of chatting! Software will start automatically after the co
FirewallSystem
- 针对计算机个人用户的网络安全问题,采用Winsock2编程技术,设计和实现了一个windows下的个人防火墙软件。 -acorrding to Individual users for computer network security problems, we are using Winsock2 programming methods to design and implement a personal firewall software under windows.
kejiwenxianjiansuo
- 科技文献检索作业,在国内数据库和一个国外数据库搜索有关“计算机网络安全和防火墙技术”的文章-Scientific literature search operations in a foreign country database and database search on " computer network security and firewall technology," the article
Backup
- IP数据包过滤源代码实现,模拟防火墙监控计算机网络通信的IP流量-IP packet filtering the source code to simulate the monitoring computer network traffic firewall IP traffic
Internet-firewall
- Internet firewall 网络防火墙,位于计算机和它所连接的网络之间的软件。该计算机流入流出的所有网络通信均要经过此防火墙-Internet firewall network firewall, in the computer and its software between the network connection. All inflow and outflow of the computer network communication have to go through th
Firewall-Technology-Guide
- 在当今的计算机世界,因特网无孔不入。为应付“不健全”的因特网,人们创建了几种安全机制,例如:访问控制、认证表,以及最重要的方法之一:防火墙。-In today' s computer world, the Internet pervasive. To cope with the " no sound" of the Internet, people have created several security mechanisms, such as: access cont
computer
- 本书与网络及系统安全紧密相联,通过大量的实例全面地分析了计算机病毒与特洛伊*所涉及的各种技术和攻击手段,详细地剖析了计算机病毒与特洛伊*的程序源代码,深入地分析了这些网络攻击的防范和清除技术,让读者真正做到知己知彼,实现防范的目的。 读者通过学习本书,可以对网络安全有较深入的认识,对计算机病毒与特洛伊*所涉及的各种技术和方法有系统的理解,能够独立完成网络信息安全的管理工作,能够编写网络安全管理程序。 -Book is closely linked with the networ
