Welcome![Sign In][Sign Up]
Location:
Search - attack

Search list

[BooksLinuxHacking

Description: Linux黑客大曝光,详细介绍了黑客攻击linux操作系统的各种手段-Linux Hacking exposed details of a hacker attack linux operating system, a variety of means to
Platform: | Size: 20423680 | Author: haoyue | Hits:

[Firewall-SecurityArithmetiqueCrypto

Description: 黑客攻击与防范 黑客常用的攻击步骤可以说变幻莫测,但纵观其整个攻击过程,还是有一定规律可循的,一般可以分:攻击前奏、实施攻击、巩固控制、继续深入几个过程。 目前比较流行的网络级安全防范措施是使用专业防火墙+入侵检测系统(IDS)为企业内部网络构筑一道安全屏障。防火墙可以有效地阻止有害数据的通过,而IDS 则主要用于有害数据的分析和发现,它是防火墙功能的延续。2者联动,可及时发现并减缓DoS、DDoS 攻击,减轻攻击所造成的损失。-Hackers attack and to prevent common hacker attacks can be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally can be divided into: attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion detection systems (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad data, while the IDS is mainly used for bad data analysis and discovery, which is a continuation of the firewall functionality. 2 person interaction, they can promptly detect and mitigate DoS, DDoS attacks, to reduce the losses caused by attacks.
Platform: | Size: 14336 | Author: jhp627 | Hits:

[TCP/IP stackddos

Description: udp flood denial of service attack progam which will flood the victim ip address and port until you stop it makes your connection lag
Platform: | Size: 4096 | Author: shitbreak | Hits:

[Game Hook Crackcode

Description: 循环 1,窗口置前 2,模拟TAB键(需要等待sleep) 3,模拟1键普通攻击 4,攻击等待(1000毫秒) //这里是上节课的模拟按键打怪的代码 HWND hwnd hwnd=::FindWindow(NULL,"Element Client") //窗口置前 ::ShowWindow(hwnd,SW_RESTORE) ::SetForegroundWindow(hwnd) //模拟1这个按键。 keybd_event(49,0,WM_KEYDOWN,0) //按下1 keybd_event(49,0,WM_KEYUP,0) 这里需要将WM_KEYUP事件改成KEYEVENTF_KEYUP事件-Cycle 1, windows home before 2, analog TAB key (need to wait for sleep) 3, simulate an attack on four key general attack wait (1000 milliseconds)// This is the analog buttons on the lesson Daguai code HWND hwnd hwnd =:: FindWindow (NULL, " Element Client" ) // set the window before the:: ShowWindow (hwnd, SW_RESTORE) :: SetForegroundWindow (hwnd) // simulate one of this key. keybd_event (49,0, WM_KEYDOWN, 0) // pressed 1 keybd_event (49,0, WM_KEYUP, 0) here WM_KEYUP event needs to be replaced by KEYEVENTF_KEYUP Event
Platform: | Size: 1872896 | Author: jeffchang | Hits:

[OtherLSB

Description: 本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
Platform: | Size: 1024 | Author: 张敏 | Hits:

[Windows DevelopARPAttact

Description: ARP attack,在一个局域网内攻击的小程序-ARP attack, at a LAN attack applet
Platform: | Size: 2512896 | Author: SS | Hits:

[Industry researchSIRB

Description: In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight. In this model, a bird flies by the wind beat motion or using its tail down. The results are positive for the construction of flying robots. The development of computational simulation based on the dynamic of the robotic bird that should allow testing strategies and algorithms of control.
Platform: | Size: 474112 | Author: MicaelSteel | Hits:

[Internet-Networkqiongqufa

Description: 穷举法。整钱零找的算法 例如100元可以换出几个10元 几个20元 几个5元-Brute force attack. The whole zero-finding algorithm such as money, 100 yuan to 10 yuan for a few number of 20 yuan a few 5 yuan
Platform: | Size: 2048 | Author: 张超 | Hits:

[Internet-NetworkBerkeleyDB-0.27.tar

Description: CCNP\ccnp课件\ISCW\5.消除网络攻击\攻击工具\MAC地址泛洪\dsniffer\BerkeleyDB-0.27.tar.gz-CCNP \ ccnp courseware \ ISCW \ 5. To eliminate network attacks, \ attack tools \ MAC address flooding \ dsniffer \ BerkeleyDB-0.27.tar.gz
Platform: | Size: 155648 | Author: 刘政 | Hits:

[WaveletLtoLHtoH_svd

Description: 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility, the extracted watermark image and the original watermark image are basically the same, anti-attack and strong.
Platform: | Size: 1024 | Author: liuyuan | Hits:

[matlabfn_collusion_attack

Description: Matlab Function of Collusion Attack
Platform: | Size: 7168 | Author: john | Hits:

[Internet-Networkippl-0.13.tar

Description: network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Platform: | Size: 26624 | Author: Balaji | Hits:

[Internet-Networkjail-1.5.tar

Description: network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Platform: | Size: 20480 | Author: Balaji | Hits:

[Internet-Networkportsentry-0.90.tar

Description: network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Platform: | Size: 37888 | Author: Balaji | Hits:

[JSP/JavaDesign

Description: sending intrusion detection for A wireless Intrusion detection system and a new attack model
Platform: | Size: 3072 | Author: naresh | Hits:

[Software Engineeringvm2

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 346112 | Author: vinay | Hits:

[matlabattack.m.tar

Description: Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requires Voicebox for matlab.
Platform: | Size: 1024 | Author: Francesco | Hits:

[Windows Developarp

Description: ARP攻击包检测代码,获取局域网中的ARP报文,分析是否为攻击报文-Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
Platform: | Size: 3072 | Author: 阮清强 | Hits:

[VC/MFCDOS

Description: 文章列表: 1,DOS系统的安装 2,恢复误删文件--DOS命令应用实例(一) 3,合并VCD片断、快速删除文件夹--DOS命令应用实例(二) 4,低格、分区、高格的应对--DOS命令应用实例(三) 5,清除CMOS密码--DOS命令应用实例(四) 6,一劳永逸--批处理命令(一) 7,让CIH永不发作--批处理命令(二) 8,巧设开机密码等--批处理命令(三) 9,DOS经典软件 10,DOS经典游戏-List of articles: 1, DOS system installation 2, restore mistakenly deleted files- DOS Command Applications (1) 3, the merger VCD clips, quick delete folders- DOS Command Applications (2) 4, low-grid, zoning, high-cell responses- DOS Command Applications (3) 5, clear the CMOS password- DOS Command Applications (4) 6, once and for all- a batch command (1) 7, so that CIH never attack- a batch command (2) 8, Qiao-based power-on password, etc.- a batch command (3) 9, DOS classic software 10, DOS Classics
Platform: | Size: 585728 | Author: zhangxuechao | Hits:

[Software Engineering0909.0573

Description: this a paper on minimizing cache timing attack on aes using cache flushing algorithm-this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
Platform: | Size: 1011712 | Author: akshay | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 50 »

CodeBus www.codebus.net