切换至中文 Over 1 million code package, 10 million code file free download
Keywords:
  • [Unix_Linux] wepdecrypt-0.8.tar.gz ... : Wepdecrypt is a Wireless LAN Tool written in c wh ich guesses WEP Keys based on a active dictionar y attack, key generator, distributed network attack and some other meth ods. it's based on wepattack and GPL licensed. WepDec rypt highlights :- ...
    Category: Windows Develop Upload User:peter1969 Size:88K
  • [DOS] land.rar ip land attack by msdos
    Category: Embeded-SCM Develop Upload User:gjszm188 Size:14K
  • [Visual C++ (VC++)] IDEA.rar ... James L. Massey in 1990 jointly proposed. As a block cipher designed a wonderful work, IDEA algorithm has strong anti-attack capability. Because encryption PGP (Pretty Good Privacy) software showed a very high security, and IDEA is the actual text of PGP ...
    Category: Windows Develop Upload User:jsdthn Size:20K
  • [C/C++] bishops.rar ... chess which is played on a board of square grids. A bishop can only move diagonally from its current position and two bishops attack each other if one is on the path of the other. In the following figure, the dark squares represent the reachable locations ...
    Category: Windows Develop Upload User:jiaoyun348 Size:1K
  • [Java/JSP] ch18.rar Catalog stored a demo web application security technology Example procedures, specific usage is as follows: 1.attack directory is demo JSP security vulnerabilities and countermeasures of web applications, can be directly deployed to the application server ...
    Category: Java Develop Upload User:zbrongping Size:12K
  • [Others] dct1_embed.rar ... of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can ...
    Category: Graph Recognize Upload User:xfjycl Size:2K
  • [Others] dwt_recover.rar ... circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks .
    Category: Special Effects Upload User:wxlk1220 Size:1K
  • [PPT] websafe.rar ... article focused on retaining some web security code hidden in comparison, programmers easily overlooked. Main elements: the second attack [Second attack] type 1: the file system function through the loopholes in the conversion type 2: Adoption of SQL ...
    Category: Other eBooks Upload User:csgnled Size:32K
  • [C/C++] RJ010401(QLSL).zip ... code and RPG (role-playing game, role-playing games) fighting operation using the menu: a menu, there are two, attack (general attack ), magic (using magic) elected after magic there will be a second-class menu, heal (treatment), magicattack (magic ...
    Category: Game Program Upload User:xcl116688 Size:37K
  • [Visual C++ (VC++)] GameSpaceHarryExe.rar Simple Space Harrier game for demonstration purposes. It has only one type of enemy which attack you in the same attack pattern indefinitely.The game is written in C Builder using the STL, Boost and VCL libraries.
    Category: Windows Develop Upload User:xinyuan Size:361K