Welcome![Sign In][Sign Up]
Location:
Search - ids

Search list

[ADO-ODBCado-2

Description: This article presents 2 simple classes that make working with ADO simple. CDyndb : This Class manages connections and recordsets. Recordsets are organized as linked list (CList) and you can access them using their IDs. CDynRec : This class is the node to populate for each recordsets.
Platform: | Size: 43008 | Author: ojs | Hits:

[Windows DevelopIDEA-1.2-bin

Description: that is better for ids system
Platform: | Size: 2597888 | Author: akashwanjari | Hits:

[Windows DevelopYahoo_Check_User_Invisible_____u_must_change_it_a

Description: this an usefull delphi program that can be used to detect invisible yahoo IDs. written in Delphi 7.-this is an usefull delphi program that can be used to detect invisible yahoo IDs. written in Delphi 7.
Platform: | Size: 23552 | Author: soroush | Hits:

[Internet-NetworkIDSYUYIN

Description: IDS语音放录程序,用于对语音的播放,可行性强-IDS recorded voice release procedures for the voice playback, the feasibility of strong
Platform: | Size: 4096 | Author: 谭强 | Hits:

[Other systemsCalculateWL

Description: 计算电路中晶体管的关键参数。 界面友好,功能实用。-a useful tools to calculate the scale of mos transistor. This Program is dedicated to calculate the Parameters of the MOSFET in analog IC design. Microsoft .net framework 2.0 or above is needed. 1) Input every THREE parameters in (Ids, Vdsat, Vds, W/L) to claculate the other one. Leave the textbox of the parameter to be calculated in EMPTY. 2) Input the ABS value of Ids, Vdsat and Vds for pmos. 3) Fast Switch: Use space, enter or tab to switch to the next input area quickly. 4) Dynamic Increase: Press the button "+" to increase the number of MOSFET. 5) Program can minizied to system tray. Click to bring it to front. 6) Select "On Top" when you finished calculation and intput data in other programs like Cadence Virtuoso.
Platform: | Size: 14336 | Author: 杜睿 | Hits:

[OS programIDSfazhan

Description: 自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。-Since 1980, the concept of generated IDS has been a host-based and network-based intrusion detection system, a model of knowledge-based recognition, identification and protocol anomaly analysis, intrusion detection technology and be able to Fast, Gigabit and even higher flow of the implementation of intrusion detection systems.
Platform: | Size: 3072 | Author: 丝琪儿 | Hits:

[Internet-NetworkgoujianIDS

Description: 通常来说,一个企业或机构准备进军此领域时,往往选择从基于网络的IDS入手,因为网上有很多这方面的开放源代码和资料,实现起来比较容易,并且,基于网络的IDS适应能力强。-Generally speaking, an enterprise or institution to prepare to enter this area, they often choose to network-based IDS from the start, because online there are many open source in this area and information is easier to achieve, and, network-based IDS adaptable .
Platform: | Size: 3072 | Author: 丝琪儿 | Hits:

[Internet-Networksnortrules-pr-2.4.tar

Description: snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具,轻型的IDS工具,拥有高效率和良好的可扩展性-snort rules
Platform: | Size: 789504 | Author: chen | Hits:

[Internet-NetworkCursePoint

Description: 网页模拟点击代码(窗口透明) 晚上某位朋友非要想能挂机点广告,问我能不能写个自动点广告的东东。一时兴起,就写了这个作品,很粗糙。改改能做远控的插件使用。考虑到网站的PV以及停留时间,通过计时器控制。由于注入IE基本所有的插软都会报警。就按1024*768做了个透明界面,在打开IE的情况下,对前端窗口进行模拟点击,保证了检测程序对IE的监控。如需后台隐藏点击,则只需单独写个浏览器隐藏运行,将此程序写成DLL注入即可。 -AppWizard creates one dialog class: CursePointDlg.h, CursePointDlg.cpp- the dialog These files contain your CCursePointDlg class. This class defines the behavior of your application s main dialog. The dialog s template is in CursePoint.rc, which can be edited in Microsoft Visual C++. ///////////////////////////////////////////////////////////////////////////// Other standard files: StdAfx.h, StdAfx.cpp These files are used to build a precompiled header (PCH) file named CursePoint.pch and a precompiled types file named StdAfx.obj. Resource.h This is the standard header file, which defines new resource IDs. Microsoft Visual C++ reads and updates this file. ///////////////////////////////////////////////////////////////////////////// Other notes: AppWizard uses "TODO:" to indicate parts of the source code you should add to or customize. If your application uses MFC in a shared DLL, and your application is in a language ot
Platform: | Size: 29696 | Author: 200 | Hits:

[Internet-Networkch1

Description: 酒店管理IDS(Intrusion Detection System)就是入侵检测系统,它通过抓取网络上的所有报文,分析处理后,报告异常和重要的数据模式和行为模式,使网络安全管理员清楚地了解网络上发生的事件,并能够采取行动阻止可能的破坏-csharp develop based on asp.net
Platform: | Size: 245760 | Author: sun | Hits:

[Editoropen-flash-chart-2-gamera

Description: 用c#或vb.net实现生成,修改pdf文件的源码,可以实现类似acrobat reader的功能,开发工具vs2005.net 语言C#,源码版本:1.2版-PDFsharp is a .NET library for creating and modifying Adobe PDF documents programmatically from any .NET language like C# or VB.NET. PDFsharp defines classes for the objects found in PDF files, so you never have to deal with IDs or references directly
Platform: | Size: 3394560 | Author: 吴潮槟 | Hits:

[OtherCiscoIDSManualconfiguration

Description: 步驟 1 確認新的 Cisco IDS/IPS 4200 系列 交換器有下列 的實體連 接: • 主控台連 接埠實體連 接到電腦超級終端機。 • 管理 10/100 乙太網路 連 接埠 (mgmt0) 連 接到外部集線器或交換器。-步驟 1 Log in to the sensor using an account with administrator privileges: • Log in to the appliance by using a serial connection. Note The default username and password are both cisco.
Platform: | Size: 1898496 | Author: | Hits:

[Internet-Networkstick

Description: A response to the denial of service tools ids
Platform: | Size: 460800 | Author: lx | Hits:

[Graph programDelaunay

Description: 使用著名的Delaunay算法实现平面三角化。鼠标任意点击可增加、插入节点、形成网格;对节点标号,可逐步观查网格的变化,体验Delaunay算法过程。内有程序结构的详细说明,易于理解和移植。-2D-triangularization is realised based on the famous Delaunay algorithm in this program. While clicking the left mouse button, new nods with IDs are added or inserted, and trangular mesh changes gradually, which demonstrates the spirits of Delaunay. Detailed explanation were also included, which help your understanding and transplanting.
Platform: | Size: 135168 | Author: fang | Hits:

[OtherBarcodes

Description: Integrate and Embedd Barcodes in Visual Basic 6 Project. If you want to generate Barcodes of IDs in your project, this can help you.
Platform: | Size: 154624 | Author: Muhammad Siddique | Hits:

[Firewall-SecurityArithmetiqueCrypto

Description: 黑客攻击与防范 黑客常用的攻击步骤可以说变幻莫测,但纵观其整个攻击过程,还是有一定规律可循的,一般可以分:攻击前奏、实施攻击、巩固控制、继续深入几个过程。 目前比较流行的网络级安全防范措施是使用专业防火墙+入侵检测系统(IDS)为企业内部网络构筑一道安全屏障。防火墙可以有效地阻止有害数据的通过,而IDS 则主要用于有害数据的分析和发现,它是防火墙功能的延续。2者联动,可及时发现并减缓DoS、DDoS 攻击,减轻攻击所造成的损失。-Hackers attack and to prevent common hacker attacks can be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally can be divided into: attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion detection systems (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad data, while the IDS is mainly used for bad data analysis and discovery, which is a continuation of the firewall functionality. 2 person interaction, they can promptly detect and mitigate DoS, DDoS attacks, to reduce the losses caused by attacks.
Platform: | Size: 14336 | Author: jhp627 | Hits:

[Program docPrius_CAN_Codes

Description: CAN traffic IDs and meanings on car Prius in non-solicited mode
Platform: | Size: 10240 | Author: Andrew | Hits:

[Otherj2178_p3

Description: J2178-3: Class B Data Communications Network messages. Frame IDs for Single-Byte Forms of Headers
Platform: | Size: 742400 | Author: DrugWash | Hits:

[OS DevelopShellCode

Description: 1、获取特殊权限 2、执行/bin/sh 3、绑定到端口。 4、反向连接。 5、躲避IDS的过滤 -1, to obtain special permission 2, the implementation of/bin/sh 3, bound to the port. 4, reverse connection. 5, to avoid filtering IDS
Platform: | Size: 4096 | Author: 张启航 | Hits:

[Internet-Networkpanoptis-0.1.4.tar

Description: Panoptis计划建立一个网络安全工具(NIDS)来发现和阻止DoS和DDoS攻击。是用C++实现,采集路由器提供的相关信息。-Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
Platform: | Size: 418816 | Author: nathun | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 20 »

CodeBus www.codebus.net