Welcome![Sign In][Sign Up]
Location:
Search - intruder

Search list

[WinSock-NDISIntruder - Remote server control

Description: Remote server control
Platform: | Size: 550535 | Author: dhw | Hits:

[Video Captureu9213343

Description: 我用Borland C++ 寫的視訊追蹤,裡面有一些安裝說明跟原始碼。內容為利用WEBCAM擷取到的影像,使用影像動態偵測的方式來判斷是否有入侵者闖入。希望大家喜歡-I use Borland C to write the follow-up video, which has some installation notes with the source code. WEBCAM content to use to capture images, the use of dynamic imaging to detect the way to judge whether the intruder entered. Hope you like them
Platform: | Size: 8244078 | Author: 張飛飛 | Hits:

[Internet-NetworkIntruder - Remote server control

Description: Remote server control
Platform: | Size: 549888 | Author: dhw | Hits:

[Video Captureu9213343

Description: 我用Borland C++ 寫的視訊追蹤,裡面有一些安裝說明跟原始碼。內容為利用WEBCAM擷取到的影像,使用影像動態偵測的方式來判斷是否有入侵者闖入。希望大家喜歡-I use Borland C to write the follow-up video, which has some installation notes with the source code. WEBCAM content to use to capture images, the use of dynamic imaging to detect the way to judge whether the intruder entered. Hope you like them
Platform: | Size: 8244224 | Author: 張飛飛 | Hits:

[OS Developaspzzzs

Description: 雷客图ASP站长安全助手 功能: 1、ASP木马查找(能够查出现在几乎所有的ASP木马) 2、文件篡改检查 3、可疑文件搜索 4、Access数据库保护 5、记录入侵者信息 -Ray customer Fig ASP assistant station master security features: 1, ASP Trojan find (to find out almost all of the ASP Trojan) 2, document tampering inspection 3, suspicious file search 4, Access database protection 5, record the intruder information
Platform: | Size: 445440 | Author: tangyi | Hits:

[OtherMd5Code

Description: 通过MD5加密后保存,和以往仅仅明文保存相比,MD5加密后的保存信息更加安全,毕竟MD5加密后的信息安全性更高,MD5加密方式也是单向的并不存在任何逆向破解。然而你是否知道MD5也并不是真正安全的,入侵者在获得了MD5加密后的字符串后依然可以通过多种方法破解成明文密码。下面就请各位IT168的读者跟随笔者从实战讨论MD5加密的安全性。  -MD5 encrypted through preservation, and preservation of the past, compared to only expressly, MD5 encrypted to preserve information more secure, after all, MD5 encrypted information of higher security, MD5 is a one-way encryption method does not exist any reverse break. But do you know MD5 is not really safe, the intruder access to the MD5 encrypted string will still be a number of ways to break through into a cleartext password. Here' s IT168 readers please follow the author from actual combat to discuss the security of MD5 encryption.
Platform: | Size: 88064 | Author: korbon | Hits:

[assembly languageTCP

Description: 扫描TCP端口是入侵者搜集目标主机开放端口的常用手法之一,而多线程的扫描能大大加快扫描速度。设置要扫描的起始IP和结束IP,开对应IP主机端口是否回复来证明是否开放-TCP port scan is a collection of target host intruder port open one of the common practices, and multi-threaded scanning can greatly speed up the scanning speed. Set up to scan the beginning of the end of IP and IP, to open the corresponding IP host port is back to prove whether the open
Platform: | Size: 137216 | Author: lzd | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[GUI Developintruder

Description: intruder radio alert system
Platform: | Size: 101376 | Author: Peruri Ravi Teja | Hits:

[matlabintruderdetection

Description: this all about Intruder Detection and Recording-this is all about Intruder Detection and Recording
Platform: | Size: 15360 | Author: maruthukkm | Hits:

[Windows Developavr

Description: Hello guys, I ve built this GSM security system as my semester project using T290i mobile and controlled my car using it. Please leave your comments about it. If any one needs help in implementing such a system, I can help. Some of the functions it can perform are: * start and stop the engine (without using the key) * stop the engine if somebody starts it with a key ( by cutting off ignition) * lock and unlock the doors * send a text message to the owner if an intruder is detected (by monitoring the doors) * switch the heater/air conditioner on and off
Platform: | Size: 1984512 | Author: Asif | Hits:

[DirextXINVASION_SRC

Description: 一个简单是入侵者游戏,在游戏中,玩家控制飞船,一方面向敌机射击,另外还需要躲避敌人的子弹-A simple game is the intruder, in the game, players control the spacecraft, on the one hand to the enemy shooting, also need to avoid enemy bullets. . . .
Platform: | Size: 1852416 | Author: huang chsh | Hits:

[Multimedia Developintruder_detection

Description: this program is to detect any intruder in real time video and raise alarm.
Platform: | Size: 12288 | Author: rohit | Hits:

[OtherIntrusion_Detection

Description: 关于入侵者检测的介绍,包括各种的入侵的手段以及部分的防御方法-The introduction of the intruder detection, including the invasion of the means and methods of some of the defense
Platform: | Size: 7407616 | Author: CHEN | Hits:

[SCMjiajuC51

Description: 基于电话线通信的家居报警系统 总程序 包括温度和入侵者检测,语音报警拨号等等。-Home-based telephone line communication procedures, including general alarm system and intruder detection temperature, voice dialing, etc. alarm.
Platform: | Size: 87040 | Author: 鲍文磊 | Hits:

[Shot GameInvasion

Description: 编译Invasion.dsw文件,在Debug目录下会生成文件Invasion.exe,直接双击该文件,即可运行“入侵者”程序。要正确编译源代码,需要安装DirectX 8.0及其以上版本。-Compile Invasion.dsw file will be generated in the Debug directory file Invasion.exe, direct double-click the file, you can run the " intruder" process. To correctly compile the source code, need to install DirectX 8.0 and above.
Platform: | Size: 538624 | Author: Michael Chen | Hits:

[JSP/JavaRecognition_of_hackers

Description: The project titled Recognition of Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time.- The project titled Recognition of Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time.
Platform: | Size: 9216 | Author: sumit | Hits:

[VHDL-FPGA-VerilogFINAL-REPORT

Description: intruder and motion detection system
Platform: | Size: 876544 | Author: sambhuprasad | Hits:

[JSP/Javagame

Description: 用java模拟苍蝇的飞行轨迹,此算法还有入侵者,当入侵者少时苍蝇会攻击入侵者,而入侵者多少苍蝇会受到攻击.-With java analog flies flight path, the algorithm was an intruder when the intruder came from a fly will attack the intruder, while the number of flies will attack the intruder.
Platform: | Size: 18432 | Author: kevin | Hits:

[Software Engineering9.Home-intruder-alert-system-using-GMAIL

Description: this document is intruder using gmail
Platform: | Size: 1131520 | Author: jeyram | Hits:
« 12 3 »

CodeBus www.codebus.net