Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Make
Search - Make - List
本教程是面向对网络安全感兴趣的菜鸟们的,只要对网络安全感兴趣,无须计算机基础,就能轻松上手,赶快看看吧!也希望籍此结交高手,交流心得,扩大我们计算机从业人员队伍。-this tutorial is geared to network security Caidaomen interest, as long as network security interest, not computer based, it was easy to get started soon and see! Also hope to use the occasion to make a master, to share experiences, expand our ranks of computer professionals.
Date : 2008-10-13 Size : 734.83kb User : 谢玉雄

DL : 0
该软件主要用于屏蔽设定关键字后的网站,具体功能包括: 可以使含有关键字的网址自动转向到你设定的网站或HTML去。 清空IE临时文件夹    清空IE历史记录 文档清空 删除收藏夹网址 删除IE地址栏网址 当然还可以定义你保密的目录 限制运行程序 清除内存中运行的程序    禁止WINDOWS下载软件等功能 恢复IE工具栏的链接名称 取消开机对话框 恢复internet选项安全页面自定义按钮 去除IE分级审查的密码 修改时间前面加广告 恢复OE标题栏广告 恢复IE搜索引擎 恢复网页右键菜单 恢复一系列文件名 恢复主页修改 修复IE的默认页面 修复文件属性里面的广告 恢复注册表文件打开方式 还原注册表被恶意代码修改 -the software used mainly shielding set keywords to the web site, the specific features include : It will make the website containing keywords automatically shifted to set your web site or to HTML. Clear IE temporary folder emptied IE historical records deleted files emptied favorites delete IE website at the address bar of course you also can define a list of confidentiality restrictions operational procedures to remove the memory running Windows procedures prohibit downloading software features such as Internet Explorer toolbar to restore the link titles boot resume dialog internet security Options button pages removed from the definition of classification review of the IE code changes ahead of time to resume OE increase advertising column heading to restore IE advertising search engine w
Date : 2008-10-13 Size : 557.45kb User : 陈信良

DL : 0
用C语言实现的椭圆加密算法,可以UNIX平台下编译,也可以作小的改动在Windows下编译。-using the C language elliptical encryption algorithm can be compiled under Unix platform, can also make minor changes in Windows compiler.
Date : 2008-10-13 Size : 60.64kb User : 石代奎

DL : 0
MD5加密算法,用标准C++完成,需要在UNIX系统上执行make来运行.可修改代码.-MD5 encryption algorithm, using standard C completed, in UNIX systems make the implementation run. code can be amended.
Date : 2008-10-13 Size : 23.63kb User : 赵康

DL : 0
本文介绍了Dos(Denial of severance 拒绝服务)和Ddos(Distributed Denial of Severance 分布式拒绝服务)网络攻击的原理和c语言实现。并且在着重分析SYN-flooding的基础之上,介绍了UDP-flooding和Icmp-flooding攻击,并做出比较。最后,就软件防火墙对于Dos Ddos攻击的过滤给出了相应对策。 关键字:Dos Ddos SYN-flooding 防火墙 tcp/ip协议-Dos (Denial of severance Denial of Service) and Ddos (Distributed Denial of Severance distributed denial of service) network attack down on the principle and C Language. And the focus on analysis SYN-flooding basis, on the UDP-flooding and Icmp-flooding attacks, and to make more. Finally, on the firewall software for Dos Ddos attack filtering the corresponding countermeasures. Keywords : Dos Ddos SYN-flooding firewall tcp / ip agreement
Date : 2008-10-13 Size : 8.76kb User : 暗夜

PIKT使一个跨平台,多功能的系统监视工具集合,可以用于系统安全管理和配置。-PIKT make a cross-platform, multi-functional system monitoring tools to gather can be used for system security management and configuration.
Date : 2008-10-13 Size : 1.59mb User : hujianwei

DL : 0
截取 OICQ 帐号密码,有所改进,适合初学者理解,比较好的素材-interception OICQ account password, make some improvements for beginners to understand, and better materials
Date : 2008-10-13 Size : 14.22kb User : jjkj

Encrypts and Decrypts a file. This is not an \"uncrackable\" type of encryption but once you can understand the basics of this type of file encryption you CAN make better ones than me. This is just a quick example of basic encryption. Highly commented to help beginners. There aren t many good examples on PSC, maybe this one is :), to me, comments are more useful than votes. simple Encrypt / Decrypt. -Encrypts and Decrypts a file. This is not an "uncrackable" type of encryption but once you c an understand the basics of this type of file enc ryption you CAN make better ones than me. This is just a quick example of basic encryption. Highl y commented to help beginners. There are not many good examples on PSC, maybe this one is :), to me, comments are more useful than votes. simple Enc rypt / Decrypt.
Date : 2008-10-13 Size : 3.47kb User : 郭春阳

DL : 0
这是一个通过VB屏蔽Ctrl+Alt+Del键的便程。当某些情况下,人们不希望操作者中止或干预程序执行,可尝试一下。-This is a VB shielding Ctrl-Alt-Del key is the way. When certain circumstances, people do not want to stay or operator intervention procedures, and try to make.
Date : 2008-10-13 Size : 14.81kb User : wl

你对硬盘上的第一个512个字节了解吗,你知道它是干什么用的吗?你知道这个区域对于你的硬盘数据的至关重要性么?你想做出独特的开机画面吗?我的这个程序就试图向您揭开这个神秘的面纱(保存、恢复分区表,实现多操作系统引导)。(如果你要运行我的程序,请仔细阅读程序的说明,否则一切后果自负!)-you on the hard drive of a 512 byte understand yet, you do know that it is used? You know the region for your hard disk data is essential nature? You want to make a unique startup screen? The procedure that I tried to kick you to the mystery of the (preservation, restoration of the partition table, multi-OS). (If you want to execute me, please read carefully the procedures stated otherwise, all the consequences of self!)
Date : 2008-10-13 Size : 13.78kb User : 刘武器

DL : 0
一个木马生成器,可盗取玩家登陆的游戏帐号 密码 游戏房间URL 随身钱数。无进程 通过80端口传递信息.主要是想让朋友们一起学习键盘钩子.老鸟就别看拉-a Trojan generator, landing the player can steal a game account passwords game rooms URL unaccompanied money. No process through 80 ports transmit information. The main aim is to make friends, learn the keyboard hook. Much Although on Rafah
Date : 2008-10-13 Size : 1.25mb User : 林林

作一定修改可以穿透还原设备,软件,用汇编以及QB描述的-make certain changes can penetrate reduction equipment, software, the compilation and description of the QB
Date : 2008-10-13 Size : 3.67kb User : 21545

DL : 0
MD5 Collision Generator. A few optimizations to make the solving method a bit more deterministic
Date : 2008-10-13 Size : 7.22kb User : yimiao

对于菜鸟来说,这是一本速成的好书,能够使菜鸟成长为Hacker!-for birdie, this is a shortcut to the books, to make a birdie grow Hacker!
Date : 2008-10-13 Size : 321.91kb User : 王耀

Encrypts and Decrypts a file. This is not an "uncrackable" type of encryption but once you can understand the basics of this type of file encryption you CAN make better ones than me. This is just a quick example of basic encryption. Highly commented to help beginners. There aren t many good examples on PSC, maybe this one is :), to me, comments are more useful than votes. simple Encrypt / Decrypt. -Encrypts and Decrypts a file. This is not an "uncrackable" type of encryption but once you c an understand the basics of this type of file enc ryption you CAN make better ones than me. This is just a quick example of basic encryption. Highl y commented to help beginners. There are not many good examples on PSC, maybe this one is :), to me, comments are more useful than votes. simple Enc rypt/Decrypt.
Date : 2025-12-16 Size : 3kb User : 郭春阳

DL : 0
MD5 Collision Generator. A few optimizations to make the solving method a bit more deterministic
Date : 2025-12-16 Size : 7kb User : yimiao

DL : 0
网络攻击的原理和c语言实现。并且在着重分析SYN-flooding的基础之上,介绍了UDP-flooding和Icmp-flooding攻击,并做出比较。最后,就软件防火墙对于Dos Ddos攻击的过滤给出了相应对策-The principle of network attacks and c language. And analyzes the basis of SYN-flooding, UDP-flooding and Icmp-flooding attacks, and to make a comparison. Finally, given Dos Ddos attack filtering software firewall countermeasures
Date : 2025-12-16 Size : 8kb User : 星星寥落

啊d网络工具源码 由西街 于2012年12月31日重新整理,补全了丢失的源码,在Delphi 7 下编译通过 望有缘人能优化,并添加更多功能!-D network tools source by West Street on December 31, 2012 refresh, make up all the lost source code compiled by Delphi 7 Look nice ring to optimize and add more features
Date : 2025-12-16 Size : 787kb User : 小意

下载者VS2010打开,希望大家守法,不要乱使用!-Those who download VS2010 open, I hope you the law, do not make use!
Date : 2025-12-16 Size : 358kb User : 进行中

This example shows a simple communication stream between a client and a server over TCP/IP. The server program also demonstrates a simple multi-threaded connection monitoring routine. The example programs do not attempt to implement a data transmission protocol. All messages are read in 64 byte chunks and the server does not attempt to relate multi-part messages from clients. However, comments in the code indicate the places where changes would be made to accomodate multi-part messages and/or alternate message frame size schemes. A client/server application is a two-part problem: first you must define the raw data transmission methodology for the programs, and second you must then implement a data transmission protocol to control the flow of the raw data and make it meaningful to the applications. This sample only attempts to deal with the first part of the problem transmitting the raw data.-This example shows a simple communication stream between a client and a server over TCP/IP. The server program also demonstrates a simple multi-threaded connection monitoring routine. The example programs do not attempt to implement a data transmission protocol. All messages are read in 64 byte chunks and the server does not attempt to relate multi-part messages from clients. However, comments in the code indicate the places where changes would be made to accomodate multi-part messages and/or alternate message frame size schemes. A client/server application is a two-part problem: first you must define the raw data transmission methodology for the programs, and second you must then implement a data transmission protocol to control the flow of the raw data and make it meaningful to the applications. This sample only attempts to deal with the first part of the problem transmitting the raw data.
Date : 2025-12-16 Size : 327kb User : nd
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.