Welcome![Sign In][Sign Up]
Location:
Search - holes

Search list

[Other resourceThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2196067 | Author: 静水 | Hits:

[OpenGL programglenabledview_demo

Description: An MDI view class supporting OpenGL. (一个opengl程序框架,里面有一个三维坐标球,支持鼠标拖拽调整视图) a function to get various information about the OpenGL implementation which is currently being used (separate information for the OPENGL and GLU libraries). manages internally the creation of display lists and offers a primitive interface for display lists execution. defines mouse cursor to be used inside the views. offers an object oriented encapsulation of quadric objects for drawing of spheres, cylinders and disks. offers an object oriented encapsulation of glu tessellator routines for translating non simple polygons (concave, self-intersecting and with holes) in groups of simple ones (triangle strips and fans). presents a simple interface to draw text strings as 2D bitmaps or complete 3D glyphs.
Platform: | Size: 84237 | Author: wang an | Hits:

[Other resourceA_Matlab_Tour_of_Wavelet_Programming

Description: This document is intended to serve as an introduction to Wavelet processing through a set of Matlab experiments. These experiments will gives an overview of three fundamental tasks in signal and image processing : signal, denoising and compression. These scripts are selfs contents (needed additional Matlab functions can be downloaded while reading the lectures). Each one of these five lectures should take between 1h and 2h in order to tests the various features of the scripts. One should copy/paste the provided code into a file names e.g. tp1.m, and launch the script directly from Matlab comand line > tp1 . Some of the scripts contains \"holes\" that you should try to fill on your own. I also provide the complete correction of these lectures as a set of Matlab scripts, but you should try as much as possible to avoid using them.
Platform: | Size: 6065881 | Author: 风帆 | Hits:

[ActiveX/DCOM/ATL2d

Description: The dispersion relation and the optical transmittance of a two-dimensional photonic crystal composed of the hexagonal array of cylindrical air holes fabricated in a dielectric slab were analyzed by group theory and the numerical calculation based on the fi nite-difference time-domain method. The decay rate of the leaky modes that exist above the light line ~the dispersion relation in air! in the band diagram was also evaluated, from which the absence of the coupling between certain internal eigenmodes and the external radiation fi eld was shown. This phenomenon was related to symmetry mismatching by the group-theoretical argument.
Platform: | Size: 185066 | Author: Qtai | Hits:

[GDI-Bitmapholes

Description: 将窗体“淘空”的程序演示,VC++ 6.0
Platform: | Size: 13047 | Author: JXf | Hits:

[Firewall-Securityautharp.tar

Description: 针对ARP协议的安全漏洞以及它所造成的网络安全问题,使用了一种对ARP的数据包进行认证的机制-against ARP security holes and the resulting network security, the use of a pair of ARP packets of data authentication mechanism
Platform: | Size: 24013 | Author: 李婧 | Hits:

[Other resourcetri-holes.rar

Description: 一个MIT Photonic Bands软件的二维三角晶系光学带隙的计算范例
Platform: | Size: 740 | Author: carrot8895163@163.com | Hits:

[Firewall-Securityautharp.tar

Description: 针对ARP协议的安全漏洞以及它所造成的网络安全问题,使用了一种对ARP的数据包进行认证的机制-against ARP security holes and the resulting network security, the use of a pair of ARP packets of data authentication mechanism
Platform: | Size: 23552 | Author: 李婧 | Hits:

[Other Riddle games滚球

Description: 滚球游戏意智游戏 问题描述 有八个小洞,序号和分布位置如图。小球从A、B、C(即洞号0、1、2)三个位置之一滚下。如果洞的状态为0时,球向左滚;如果洞的状态为1时,球向右滚。凡是球滚过的洞,状态取反(既由1变0,由0变1)。 现用8位二进制数依次从左到右表示八个小洞的状态。 例: 图中的初始状态为 00000101 时,最多滚入3个球时有 从C洞滚入一小球状态为 ————> 00101111 从B洞滚入一小球状态为 ————> 01111011 从A洞滚入一小球状态为 ————> -bowls game Italy-game description eight holes and serial number and distribution figure. Small ball from the A, B, C (hole No. 0,1,2), one of the fallen three locations. If the state of the hole 0:00 a.m., the ball rolling left; If the state of the hole 1:00, the ball rolling right. Whatever strain at the hole, from the anti-state (both from a variable 0, 0 Variable 1). Now with eight followed by the binary number eight hole, said whatever the state. Cases : Figure the initial states of 00000101, three roll-up ball from C hole rolled over a small ball of----> 00101111 B hole rolled over from one state to the small ball----> 01111011 from A hole rolled over a small ball of---->
Platform: | Size: 34816 | Author: 轩哥哥 | Hits:

[source in ebookSCC_WebSystem_v1[1].20

Description: 安全中心整站系统是一个网络安全类整站系统。由七个模块组成,其中包括:文章系统(安全文档)、下载系统(安全工具、**作品)、漏洞发布系统(安全漏洞)、代码发布模块(漏洞利用)、在线申请模块(工作室)和信息发布模块(关于我们)。 -Safety Center Station whole system is a network security system like the whole station. By seven modules, including : articles (safety documentation), downloading system (security tools,** works), loophole Publishing System (security holes), the code is distributed modules (exploits), the online application module (studio) and information dissemination module (for us).
Platform: | Size: 888832 | Author: | Hits:

[Windows DevelopAccessEnumSource

Description: While the flexible security model employed by Windows NT-based systems allows full control over security and file permissions, managing permissions so that users have appropriate access to files, directories and Registry keys can be difficult. There s no built-in way to quickly view user accesses to a tree of directories or keys. AccessEnum gives you a full view of your file system and Registry security settings in seconds, making it the ideal tool for helping you for security holes and lock down permissions where necessary.-While the flexible security model employe d by Windows NT-based systems allows full Contr ol over security and file permissions, managing permissions so that users have approp riate access to files, directories and Registry keys can be difficult . There s no built-in way to quickly view user acc esses to a tree of directories or keys. AccessEn um gives you a full view of your file system and Re gistry security settings in seconds. making it the ideal tool for helping you for secu LAN holes and lock down permissions where nece ssary.
Platform: | Size: 107520 | Author: 李杰 | Hits:

[Process-ThreadSecDemoSource

Description: Are your device objects as secure as they should be? Learn what permissions are applied to the objects you create with IoCreateDevice and get introduced to kernel-mode security APIs that can be used to close potential device object security holes. -Are your device objects as secure as they sh ould be Learn what permissions are applied to th e objects you create with IoCreateDevice and ge t introduced to kernel-mode security APIs that can be used to close potential device object sec France holes.
Platform: | Size: 101376 | Author: 李杰 | Hits:

[GUI DevelopRectangle

Description: 探讨了矩形件和任意形状图案的排样优化问题的遗传算法求解,提出了剩余矩形表示法和条形图表示法。对于矩形排样,剩余矩形表示法提高了板材利用率,更容易得到较优解。对于任意形状图案排样,条形图表示法直接利用位图排样,不对图案作任何限制(允许有孔洞),排样速度很快。该算法已应用于智能印花分色系统中。-on rectangular pieces of arbitrary shape and pattern layout of genetic optimization algorithm. the remaining rectangle said law and bar charts representation. For rectangular nesting, said the remaining rectangular plate method to improve the efficiency and easier to obtain a better solution. For arbitrary shape pictorial layout, bar charts, said the use of Direct bitmap nesting, pictorial not make any restrictions (to allow holes), the layout very quickly. The algorithm was applied dichroic Intelligent Printing System.
Platform: | Size: 346112 | Author: wayllen | Hits:

[GDI-BitmapPieProgressCtrl_src

Description: The Code Project is an exciting site with impressive teaching and professional exchange capabilities. I have learned much from it and also decided to submit my contribution. Occasionally I was involved in a project to check experimental data for consistency. The data were collected in several binary files, which also contain "holes", i.e. missing data segments. The main idea to simplify the fast check report was to embed this report inside the progress control.-The Code Project is an exciting site with im pressive teaching and professional exchange c apabilities. I have learned much from it and als o decided to submit my contribution. Occasiona lly I was involved in a project to check experime ntal data for consistency. The data were collec ted in several binary files, which also contain "holes" ie missing data segments. The main idea to sim plify the fast check report was to embed this rep ort inside the progress control.
Platform: | Size: 18432 | Author: 小叹号 | Hits:

[P2PP2Pshili

Description: 这是用VB.net实现的一个简单的P2P示例.利用了UDP打洞技术.分服务器端跟客户端.服务器端负责登陆记录用户的IP和端口及转发打洞消息.-This is achieved using Programs require a simple example of P2P. UDP burrows use of the technology. Service hours Treasury ends with the client. server-side landing records for users of IP and port holes and transmit information.
Platform: | Size: 15360 | Author: fulingfang | Hits:

[OtherThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2195456 | Author: 静水 | Hits:

[P2PP2P

Description: 实现P2P通讯的底层类,其主要时根据网络资料的所提供的通过UDP打洞的方式穿透防火来实现的-Realize the underlying P2P communication category, the main information in accordance with the network provided through the UDP holes penetrating fire way to achieve the
Platform: | Size: 43008 | Author: 刘SIR | Hits:

[Internet-NetworkMakeTCPHole

Description: VC++实现TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞,有详细的说明文档,对于想了解P2P软件工作原理的人很有启发作用。-VC++ Realize TCP realize P2P communications, TCP through the NAT method, TCP holes, have detailed documentation for the P2P software would like to know the working principle of the people is very inspiring.
Platform: | Size: 164864 | Author: 谢红伟 | Hits:

[Special Effectscell

Description: 源码包含了常见的图像形态学算法,如图像基本逻辑运算,阈值分割,边缘处理,孔洞填充等-Source image contains a common morphological algorithms, such as images of basic logic operations, threshold segmentation, edge treatment, holes filled, etc.
Platform: | Size: 2866176 | Author: 小冯 | Hits:

[Internet-NetworkMakeTCPHoleSCR

Description: 这是一个TCP打洞的程序,是用VC编写的,很好懂-This is a TCP holes the procedure is the use of VC prepared, well understood
Platform: | Size: 11960320 | Author: jqx | Hits:
« 1 23 4 5 6 7 8 9 10 ... 16 »

CodeBus www.codebus.net