资源列表
MD5change
- 第三范式公司郭德纲
硬盘保护
- 我们的数据,文档基本上都存储在硬盘中,而硬盘的安全性将成为关注的焦点,本程序将针对硬盘的安全性进行相应处理-our data, document basically stored on the hard drive, and hard disk security will be the main focus of concern, the program will address the safety drive for appropriate action
instructer-of-hacker
- 亲爱的站长同志,你好,非常想加入,此内容是关于黑客攻击命令的文件。非常好 。-Dear webmaster comrades, hello, very much like to join this file on the command of the hacker attacks. Is very good.
《windows 核心编程》源码
- 《windows 核心编程》源码-code of <windows sock programming>
ratproxy
- 对Google公布的ratproxy网站安全评估系统源代码进行了详细的汉语注释,几乎分析了其中每一个重要函数函数代码,是一个开发网站安全评估系统的很好的参考学习资料,包含个人总结的两个系统函数执行流程图。(在下水平有限,难免有错误,望指正)-Google announced ratproxy site safety assessment system source code, a detailed annotation of Chinese, almost each of which is an
Software-security-experiment
- 栈溢出漏洞实验,源码加实验截图及实验报告 验证并解释程序bufferoverflow2.cpp 使用CodeBlocks编译示例程序bufferoverflow2.cpp 验证并解释程序password.cpp -Stack overflow Validation and explain program Write example program bufferoverflow2.cpp password.cpp
200552181033553_600it
- 第三方空间//--- --- --- --- --- --- --- #include <vcl.h> #pragma hdrstop USERES(\"WinSkinC5.res\") USEPACKAGE(\"vcl50.bpi\") USEUNIT(\"WinSkinReg.pas\") USERES(\"WinSkinReg.dcr\") USEPACKAGE(\"vclx50.bpi\") //----------------
WebService-ComunicationInformation-for-searching.r
- 用webservice做的,要求环境visual basic 2005,asp 2.0
the_2_way_for_using_lookaside_to_break_software.ra
- 利用LOOKASIDE 的列表来覆盖VTABLE方法,使得shell code写入特定的位置,然后引起shell code的执行。
VBI_Vulnerabilities_Portfolio.pdf
- vulnerability prices for compare
into-the-input
- 强悍的输入法注入,主要是注入输入法的一种方式-Powerful input method injection, into the input
ipv6-ms
- Document, hot Document,IPv6