搜索资源列表
sx.rar
- 一个攻击端口软件,根据最新漏洞写成,以后还有会有拒绝攻击代码,A port attack software vulnerabilities, according to the latest languages, and there have refused to attack code
CC
- 易语言cc攻击器 批量导入代理 群体-Cc attack device easy language
Queen
- n*n的棋盘上放置彼此不受攻击的n个皇后,按国际象棋规则可知:皇后可以攻击同行同列同斜线的棋子-n* n chessboard placed on each other from attack of the n-Queens, according to chess rules we can see: Queen can attack the peer-pawn with the column with a slash
internet
- 隋着internet的迅猛发展,安全性已经成为网络互联技术中最关键的问题。本文全面介绍了internet防火墙技术与产品的发展历程;详细剖析了第四代防火墙的功能特色、关键技术、实现方法及抗攻击能力;同时简要描述了internet防火墙技术的发展趋势。-Sui with the rapid development of internet, security, network interconnect technology has become the most crucial problem. T
antiarp5.0.1
- 防止ARP攻击的好工具 用了都说好的 试试看旧知道-ARP attack to prevent a good tool used to know the old saying that a good try
bahuanghou
- 在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。-In the 8x8 grid of the International Chess Queen placed eight, making it unable to attack each other, that can not be any two Queen s in the same line, the same row or on the same slash an
queen
- N皇后问题,N皇后放置过程的现实。 由八皇后问题扩展开来,在N*N的棋盘上摆放N个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上。求可能的解决方案,并显示每一种解决方案的皇后放置过程。-N Queen' s problem, N Queen placed the reality of the process. Expansion by opening eight to question Queen' s, at the N* N chessboard
eightqueens
- 用 Scheme 来解决八皇后问题。八皇后问题:在 8*8 的棋盘上放置彼此不受攻击的 8 个皇后。按照国际象棋的规 则皇 后可以攻击与之处在同一行或同一列或同意斜线上的棋子。找出所有合法的 使8 个皇后 彼此不受攻击的放置方法。1 )除了完成 queens 的定义之外 , 给出一个打印输出过程 print-queens-Scheme used to solve the problem of the eight Queen' s. 8 Queen' s problem: In the
aircrack-ng-1.0-rc3.tar
- Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attac
hundun_svd_0525
- 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band ima
LSB
- 本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
Cube-attack
- Cube 攻击的几篇文章,Cube Attack由Itai Dinur 和Adi Shamir于2008年提出。这种攻击并不是全新的,但是它把以前多种启发式攻击的技巧综合起来,仔细分析了攻击未知的、随机的主多项式成功的复杂度和成功概率。-Some papers of Cube attack,Cube attacks work well for random polynomials of small degree. Real-world ciphers, when viewed as polyno
Cube-attack-on-toy
- 对Cube攻击的一些评价,正面和反面的都有-Hundreds of cryptographers were sitting in a dark lecture room at the University of California at Santa Barbara in the morning of Tuesday 19 August 2008 listening eagerly to Adi Shamir s hour-long talk "How to solve it: new tech
CC-Attack-Device
- CC Attack Device [Beta version] CC Attack Device [Beta version]-CC Attack Device [Beta version]CC Attack Device [Beta version]
ARP-ATTACK
- 使用WINPCAP编写的ARP攻击,在WIN7下能完美运行,采用VC6.0编译-The the ARP attack use WINPCAP written, under the WIN7 perfect run, VC6.0 compiler
Sample-code-for-Ns2-Wormhole-attack
- sample NS2 source code(in texe file) that simulate WORMHOLE attack.
grayholeaodv
- Grayhole attack in NS2
freeprojects.co.in_Project_SourceCode
- vampire attack on manet
A Man-in-the-Middle Attack on UMTS
- a paper about UMTS, In this paper authors present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base
attack
- 随机蓄意攻击对比 攻击效果对比的图形 最后还有半数致死量(random attack and on purpesrandom attack and on purpesrandom attack and on purpes)