CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
SourceCode
OS program
Exploit
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
Exploit list
Sort by :
«
1
2
...
.07
.08
.09
.10
.11
112
.13
.14
.15
.16
.17
...
187
»
3334
Downloaded:0
System skills, attention to system security to eliminate potential safety problems and reduce the risk of
Date
: 2008-10-13
Size
: 3.6kb
User
:
刘华
pe_dll_backdoor
Downloaded:0
Exe file to run through the infected DLL code, VC++ Development, writing Trojan friends can refer to the following
Date
: 2008-10-13
Size
: 40.17kb
User
:
方景
chapter10
Downloaded:0
Date
: 2008-10-13
Size
: 5.69kb
User
:
王浩
huanchong
Downloaded:0
Three way file cache operation, and by comparing the average time to understand the file cache
Date
: 2008-10-13
Size
: 93.39kb
User
:
郭浩
idle
Downloaded:0
Create a process modeled on the books method, the parent process to create two processes, and then request to change the basis of experiment, observation and understanding of the process is running.
Date
: 2008-10-13
Size
: 38.66kb
User
:
郭浩
huancun
Downloaded:0
Three way file cache operation, and by comparing the average time to understand the file cache
Date
: 2008-10-13
Size
: 164.71kb
User
:
郭浩
Wormhole_Simulation_Code
Downloaded:0
This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 Februar
Date
: 2008-10-13
Size
: 40.85kb
User
:
旺老财
DugSongToolKit
Downloaded:0
A network tool kit, you can email and http sniffer, such as packets of information such as passwords. Attention must first libnet-1.0.2a.tar.gz and libnids-1.16.tar.gz loaded, or because of the lack of library functions
Date
: 2008-10-13
Size
: 161.53kb
User
:
冷于冰
MYException
Downloaded:0
System-level approach to exception handling, release the source code, binary-level record of abnormal function, you can view the memory situation, register the case, but also how such a mistake in which line
Date
: 2008-10-13
Size
: 11.19kb
User
:
叶振华
threadx
Downloaded:0
Date
: 2008-10-13
Size
: 979.23kb
User
:
701
SQL
Downloaded:0
This is the network security aspects of anti-SQL injection summary
Date
: 2008-10-13
Size
: 13kb
User
:
乃牛
Password
Downloaded:0
Exhaustive attack in order to resolve the trouble, which can be used to set permissions- users log on the number- to avoid another attack.
Date
: 2008-10-13
Size
: 28.44kb
User
:
唐扬
«
1
2
...
.07
.08
.09
.10
.11
112
.13
.14
.15
.16
.17
...
187
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.