-
-
[
CHM]
Watermark_5.rar
... , Watermark_2, Watermark_3, Watermark_4 Experimental instructions. Through these four algorithms are familiar with, simply amend the embedding, extraction, attack source function, you can quickly achieve a variety of image watermarking algorithm.
-
-
[
HTML/CSS]
20081120224906.rar
... shows the main use of javasript to achieve the mouse on the page a variety of effects, such as the use of procedures to record the mouse on the page of the sliding track of the mouse to attack the text, flexibility, etc. Ha ha good effects of the mouse.
-
[
Visual C++ (VC++)]
qq.rar
qq message automatically sent to attack through qq information (click on the realization of simulation)
-
[
C/C++]
huan.rar
Buffer overflow attacks on the network procedures, the use of intrusion detection tools should adhere to really achieve the purpose of the attack
-
[
Windows_Unix]
ohh-code.zip
oracle source of attack and defense of the Road oracle source of attack and defense of the Road for the existence of security vulnerabilities oracle analysis
-
[
C/C++]
RJ010403(403).rar
... the same directory: player1: on Up next Left Right Right Left Down attack 0 player2: on W under S Left A Right D attack ... SPACE: the game did not effect the production of attack, and they should only attack if hit judgments. If one button without letting ...
Category:
Shot Game Upload User:
gydd2007 Size:
30K
-
-
[
Visual C++ (VC++)]
8_QUEENS.rar
... the nineteenth century, the famous mathematician Gauss in 1850: Under the 8x8 grid of the International Chess Queen placed eight, making it unable to attack each other, that can not be any two Queen s in the same line, the same row or the same slash on, ...
-
[
C/C++]
Eightempressesplay.rar
... games, by Gauss in 1850 first proposed. Requirements in the international chess board to place eight of the Queen, making it unable to attack each other, that is, any two of the Queen s not in the same line board, the same columns and with a diagonal. ...