-
-
[
PDF]
windows_XP_Hacks.rar
Windows XP is the most widely used operating system. This book details how the attack WindowsXP loopholes.
Category:
OS Develop Upload User:
zhuhaitckj Size:
5301K
-
-
[
Java/JSP]
yizhen5jiantingdashangchuan.rar
controlled by submarine torpedo attack targets water-merchant. As the driver to the process of loading a large number of pictures, sound effects documents may need to wait for a certain period of time
-
-
-
-
[
Others]
displayChallenge.rar
licensing shape analysis from the existing licenses can be extracted attack licensing some form of license
-
[
Matlab]
blindwatermark.rar
... procedures, including multiresolution embedded watermark, watermark extraction procedure, blind watermark embedding and extraction procedures, Filtering and attack and attack JPEG procedures, PSNR and the similarity calculation formula (MATLAB)
-
[
Delphi]
delphibahuanghou.rar
... the famous 19th century mathematician Gauss 1850 : 8 X8 in the lattice placed on the international chess 8 Queen's, making it unable to attack each other. arbitrary or two at Queen's are not the same line, the same series or in the same slash and ...
-
[
Matlab]
11_watermark.rar
audio digital watermark on the production, including audio digital watermark embedded in the attack, extraction, detection