-
-
[
C/C++]
tinyproxy-1.4.0pre2.tar.gz
... is very useful in a small network setting, where a larger proxy like Squid would either be too resource intensive, or a security risk. One of the key features of tinyproxy is the buffering connection concept . In effect, tinyproxy will buffer a high ...
-
[
MultiPlatform]
safe.rar
University of network security technology exam papers, and they hope to学弟学妹们helpful, 1. The following does not belong to the packet filter inspection (D) A. Source address and destination address B. Agreement C. Source port and target port D. The contents ...
-
[
C/C++]
libike.0.9.2.tar.gz
... a cross-platform C library for managing IKE negotiations. The library implements RFC-standard ISAKMP/IKE exchanges and utilizes a callback mechanism to delegate tasks of the actual packet transmission and security policies management to the external code
-
[
Visual C++ (VC++)]
ArtGallery.rar
... have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to write a program which finds the surface of the area of the floor, ...
-
[
PDF]
DMF5005N-SEW-ABE-CP.rar
... , we cannot takeresponsibility if the product is used in medical devices, nuclear power control equipment, aerospace equipment, fire and security systems, or any other applications in which there is adirect risk to human life and where extremely high ...
Category:
SCM Upload User:
jnhx888 Size:
70K
-
[
Visual C++ (VC++)]
MSNPP.ZIP
A good sample source for "Windows Live Messenger PP Security" account management, it can List/Set Windows Live Messenger accounts in the computer.
-
[
Java/JSP]
Cryptography.rar
... package offers three encryption algorithm source code: DES, AES and RSA. Procedures did not use Java' s security database is entirely in accordance with their own encryption and decryption algorithm flow manually prepared. Cryptography for encryption ...
-
[
PDF]
RFID-tags-security-and-the-individual.rar
When I lastwrote for CSLR, RFID tagswere but a glimmer in
some scientist’s eye. The thought that by 2006 they would be
in everyday use [even if we did not know it] was unthinkable.
However, the fact is that technology hasmoved on and RFID is
the next ...
Category:
RFID Upload User:
gzyjmaoy33 Size:
78K
-
[
WORD]
E-comcasestudy1.rar
this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
Category:
Document Upload User:
jiahe63 Size:
470K
-
[
PDF]
Mifare.Cryptanalysis.rar
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway
tickets, and various other security-related applications has recently been disclosed