-
-
[
Delphi]
ILoveYouvirus.Rar
... because it was not only the variant of the virus to attack RPC vulnerability, but also copies itself into% system% \ Wins ... detection randomly generated IP address whether and, if they start to attack. The virus in infected systems use random ports 666-765 ...
-
-
[
C/C++]
usedbeforetheattacksoftwaresourcecode.Rar
attacks commonly used procedures Abstract Here are some of the old, and now it is useless, but they are well known. A Land attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port launched with a link (the SYN), Win95 ...
-
[
Java/JSP]
strictmessageboard.Rar
... : COOKIE unique use of the message to protect, so that in a minute not repeat posting! To prevent some people who maliciously attack! 3 : optimization of the page, so that newcomers more easily read its contents! 4 : management background used to protect ...
-
-
-
-
[
Visual C++ (VC++)]
diwm1.rar
framework of the digital watermarking digital watermarking a framework, and the watermark is simple attack. However, the lack of an embedded algorithm.
-
[
TEXT]
377.rar
[Network order/unknown book] win2000 network initial 1】 ping command to test network set up connections, access to ip addresses, the attack can also be used to ping-l 65500-t 127.0.0.0 Continuous 『address to send to a size of 65,500 the size of the packet ...
Category:
E-Books Upload User:
jsxzlidq Size:
3K
-