-
-
[
Visual C++ (VC++)]
PCPerformaceTest.zip
include : apache exploit, ie exploit. win xp 2000 task scheduler exploit, and the generation of x86 linux shellcode sql spill and the latest source code (concept version). These are from a study in Australia* merciless cold-blooded friends from abroad ...
-
[
MultiPlatform]
WindowsANIZeroDayAnimated_Cursor_Exploit.rar
Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I th ink it is first real remote code execution explo it on vista =) Tested on : Windows Vista Enterprise Version 6.0 (Build 60 00) (default installation and UAC enabled) ...
-
[
Java/JSP]
megahal-9.1.1.zip
megahal conversation is the co simulators nversing with a user in natural language. The pr ogram will exploit the fact that human beings te nd to read much more meaning into what is said tha n is actually there MegaHAL differs from conver sation ...
Category:
SCM Upload User:
shdhgs Size:
110K
-
[
CHM]
The.Shellcoder.s.Handbook.Discovering.And.Exploi
... wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
-
[
PDF]
Dimensionalreductionforparticlefiltersofsystemswit
... filter construction for a system that exhibits
time-scale separation. The separation of time-scales allows two simplifications
that we exploit: i) The use of the averaging principle for the
dimensional reduction of the system needed to solve for each ...
Category:
SCM Upload User:
liter937 Size:
181K
-
[
PDF]
AMODIFIEDRAO-BLACKWELLISEDPARTICLEFILTER.rar
Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle
Filters (PFs) that exploit conditional dependencies between
parts of the state to estimate. By doing so, RBPFs can
improve the estimation quality while also reducing the overall
...
Category:
SCM Upload User:
xingqi2007 Size:
119K
-
[
C/C++]
findretloc.rar
An automatic search retloc a small script, which can be extracted lies mainly in the findretloc function so exploit more intelligent, see the specific use of the source code. Coresecurity paper draws its inspiration from the dvdman and exploit.
Category:
AI-NN-PR Upload User:
bcsw168 Size:
1K
-
[
Visual C++ (VC++)]
Atom1.rar
... cube, and map the sky texture in five faces except the floor face.2. The viewing is freely moved inside the cube. You can exploit the keyboard or mouse handle. 3. The light is located in the cube.4. You generate three kinds of objects.5. You mapped the ...
-
[
WORD]
information_management_strategy_for_police_service
... , in the right form, in the right time at an appropriate cost. The Strategy will ensure the Police Service has a collective understanding of the value of information and that we are able to exploit National Information Assets in support of local policing.
-
[
Matlab]
EMdemo.rar
n this demo, we show how to use Rao-Blackwellised particle filtering to exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic ...
Category:
AI-NN-PR Upload User:
pjzjjf Size:
14K