-
-
[
Matlab]
dct333.rar
DCT watermark process, achieved a watermark robustness and transparency, to test the effect of an attack
-
[
Others]
main.rar
... of the structure of the format, skills proficiency. 1.2 games introduced bees play is a classic click game. Games for gamers to operate an aircraft located at the bottom of the screen, the top of the screen to attack enemies. The top down flying enemies.
-
[
MultiPlatform]
PGP.rar
... ◎ IDEA foreword security issue ◎ RSA security issue chosen ciphertext attack ● ● too small e ● RSA encryption index of the timing attack ... MD5 security ● MD5 issues common to a direct attack on the MD5 ● ● birthday attack other attacks on the MD5 password ...
-
[
PDF]
overflow.rar
(Hackers Books) The Art of overflow. Software crack and attack type
-
-
[
C/C++]
8queen.rar
8 × 8 in a chess set, there s eight, each accounting for a Queen s grid request will not be any mutual between Queen s attack phenomenon, that can not have two Queen s in the same line, the same row or the same diagonal. Asked the total number of ...
-
[
C/C++]
netsafe1111--7.rar
... UDP Datagram 7.4.3 HTTP protocol analysis 7.4.4 FrP protocol analysis 7.4.5 Telnet protocol analysis 7.4.6 POP3 protocol analysis 7.4.7 SMTP and ESMTP protocol analysis 7.4.8 IP packet capture and analysis 7.4.9 Detection attack an example of 7.5 Summary
-
-
[
Visual C++ (VC++)]
warrior_load_source.rar
... - Articles Editor mls_edit.exe- Script Editor msl_edit.exe- magic editor gameplay: Use the WAD or ↑ ← → mobile, the left mouse button to attack or talk to the state of the right mouse button pop-up menu. Click the left mouse button while holding down ...
-
[
Visual C++ (VC++)]
MyLib.rar
Library management system, a relatively comprehensive, ODBC good learning materials, learning only the attack, declined plagiarism