搜索资源列表
FiveKinds
- apache exploit,ie exploit,win 2000 xp task scheduler exploit,以及生成 linux x86的 shellcode和最新sql溢出源代码
win 2000 xp task scheduler exploit
- xp的计划任务溢出-xp the planned tasks Overflow
Captureprocedure
- Very simple several capture procedure that I write, is used to test capture efficiency in rough (being that Test2 carrying out the fundamental step capturing carries out capture Test4 by transferring packet.dll temporarily for a specific tas
PCPerformaceTest
- 包括:apache exploit,ie exploit,win 2000 xp task scheduler exploit, 以及生成 linux x86的 shellcode和最新sql溢出源代码(概念版),这些都是 由一位在澳大利亚留学的朋友冷血*无情从国外网站上收集的。感谢他的辛勤劳动。 -include : apache exploit, ie exploit. win xp 2000 task scheduler exploit, and the generation of
WP4
- 使用vc6.0用win32api结合mfc编写的任务管理器,能列出当前运行的进程,并能结束进程,有很好界面哦-use vc6.0 combined with win32api mfc prepared by the task manager, to a list of running processes, and the end of the process, a very good interface oh
TASKLR12
- WINDOWS任务管理器, 系统控制类。-Windows task manager, system control category.
hideprocessxp
- use a single method for hide from task manager windows, use only winapi function.
FUZZY-COGNITIVE-MAPS-FOR-DECISION-SUPPORT-IN-AN.r
- The “health” of a computer network needs to be assessed and protected in much the same manner as the health of a person. The task of an intrusion detection system is to protect a computer system by detecting and diagnosing attempted breaches
