切换至中文 Over 1 million code package, 10 million code file free download
  • [WORD] ArithmetiqueCrypto.rar ... be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally ... attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more ...
    Category: Firewall-Security Upload User:duanxin Size:14K
  • [Visual C++ (VC++)] 02073055.rar arp spoofing attack program can be achieved within the LAN ARP spoofing attack, just finished a computer network operations, to give beginners a reference bar.
    Category: Internet-Socket-Network Upload User:ykjgjymj Size:1284K
  • [DOS] usbcleaner20091001.zip Some viruses hijack the application, the same USBCleaner the virus has become the object of attack. If it is caused by a virus, double-click USBCleaner in general there is no reaction to the main program. Workaround: USBCleaner.exe into other random 989. ...
    Category: USB develop Upload User:jsylsj126 Size:3569K
  • [Visual C++ (VC++)] code.rar Cycle 1, windows home before 2, analog TAB key (need to wait for sleep) 3, simulate an attack on four key general attack wait (1000 milliseconds)// This is the analog buttons on the lesson Daguai code HWND hwnd hwnd =:: FindWindow (NULL, " Element ...
    Category: Windows Develop Upload User:zhou200808 Size:1829K
  • [Visual C++ (VC++)] optimark_manual.zip Watermark attack test program optimark. This more comprehensive test than stirmark watermark program, very good use
    Category: Special Effects Upload User:shahe899 Size:1432K
  • [Unix_Linux] modsecurity-apache_2.5.9.tar.gz modsecurity is a very good linux environment, open source software, Defense web attacks, it can be defensive attack against apache, using the rules match, its decoding process and matching process is very worthy of study and reference.
    Category: Linux-Unix program Upload User:xq1107 Size:1223K
  • [PDF] 2.rar ... the algorithm has good p roperties of confusi on and diffusi on . The key space is large enough t o resist the brute2 force attack . For the encryp ted i mage the distributi on of p ixel2 values has a random2like behavi or and the values of adjacent p ...
    Category: Graph program Upload User:laoyuhjzm Size:554K
  • [Matlab] LSB.rar Resistance to attack watermarking algorithm is proposed
    Category: matlab Upload User:adebao Size:1K
  • [Others] w123zh.rar Very powerful device attack on a website on November 18 by release source code to give up this program, the current program version is version 4.5. W123zh This program is produced by a hacker tool, an attacker also good, hope we can continue to develop ...
    Category: Internet-Socket-Network Upload User:lqlong227 Size:49K
  • [Java/JSP] queens.rar ... using the N-a queen arranged procedure. Behalf of the international chess with an asterisk in the queen. Randomly generated layout, display each move, the final result is queen can not attack each other. That is not in the same row, column and diagonal.
    Category: Game Program Upload User:info86 Size:12K