-
-
[
WORD]
ArithmetiqueCrypto.rar
... be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally ... attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more ...
-
[
Visual C++ (VC++)]
02073055.rar
arp spoofing attack program can be achieved within the LAN ARP spoofing attack, just finished a computer network operations, to give beginners a reference bar.
-
[
DOS]
usbcleaner20091001.zip
Some viruses hijack the application, the same USBCleaner the virus has become the object of attack. If it is caused by a virus, double-click USBCleaner in general there is no reaction to the main program. Workaround: USBCleaner.exe into other random 989. ...
-
[
Visual C++ (VC++)]
code.rar
Cycle 1, windows home before 2, analog TAB key (need to wait for sleep) 3, simulate an attack on four key general attack wait (1000 milliseconds)// This is the analog buttons on the lesson Daguai code HWND hwnd hwnd =:: FindWindow (NULL, " Element ...
-
-
[
Unix_Linux]
modsecurity-apache_2.5.9.tar.gz
modsecurity is a very good linux environment, open source software, Defense web attacks, it can be defensive attack against apache, using the rules match, its decoding process and matching process is very worthy of study and reference.
-
[
PDF]
2.rar
... the algorithm has good p roperties of confusi on and diffusi on . The key space is large enough t o resist the brute2 force attack .
For the encryp ted i mage the distributi on of p ixel2 values has a random2like behavi or and the values of adjacent p ...
-
[
Matlab]
LSB.rar
Resistance to attack watermarking algorithm is proposed
Category:
matlab Upload User:
adebao Size:
1K
-
[
Others]
w123zh.rar
Very powerful device attack on a website on November 18 by release source code to give up this program, the current program version is version 4.5. W123zh This program is produced by a hacker tool, an attacker also good, hope we can continue to develop ...
-
[
Java/JSP]
queens.rar
... using the N-a queen arranged procedure. Behalf of the international chess with an asterisk in the queen. Randomly generated layout, display each move, the final result is queen can not attack each other. That is not in the same row, column and diagonal.