搜索资源列表
N.C.P.H--heikejishuyuwangluoanquan
- 黑客技术与网络安全,,,,值得一看,,是一般不错的电子书籍-hacking technology and network security,, an eye-catcher, is generally good e-books
patch0r
- Hijack All Process On WinNT Systems Version 0.1 RedKod Team www.redkod.com 用于进程注入,呵呵。干什么知道了吧:)-Hijack On WinNT Process Systems Versio n 0.1 RedKod Team www.redkod.com for injection process, Ha ha. Do not you know :)
c-
- wo ju de hai hao ne ni men zem me ren wei de xi wan dui ni men you yong ba thank you -ju de wo hai ne ni hao men zem me ren wei de xi wa n dui ni ba yong men you thank you
greyPIDcontroller
- 连续系统灰色PID控制 连续系统灰色PID位置跟踪 灰色理论 GM(0,N)模型 GM(0,2)模型 graph.m文件画仿真曲线 -continuous PID control systems gray continuous system gray PID position tracking Gray GM (0, N) model GM (0,2) model graph.m paper painting simulation curve
shiftstring
- shift strings /to left n positions.
WIN32virus.rar
- 里面包含了N个病毒代码.汇编.c++/c编写,Which contains the N个virus code. Compilation. C++/c preparation
Fire-Net
- fire net Suppose that we have a square city with straight streets. A map of a city is a square board with n rows and n columns, each representing a street or a piece of wall.
scan-ngix
- 通过GOOGLE检索有漏洞的ngnix的站点,请提交GOOGLE搜索关键\n默认搜索文件类型为PHP的所有站点,-use google engine to scan have weak point ngnix website, please submit search key words, default use PHP filetype
poly
- A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution
28737-1034651-winadmin-gestion-reseau-local
- oici la version NET de mon prog WinAdmin. (Voir section Ré seau et intern et pour la version vB6. <br /> J ai revu la plupart des fonctions concer nant les utilisateurs / groupes / postes. <br /> <br />Permet la gest
