Welcome![Sign In][Sign Up]
Location:
Search - intruder

Search list

[OpenCVLuFanOpenCV_V1

Description: 项目设计并实现了一个具有闯入报警功能的智能监控系统。该系统包括视频采集、视觉分析与输出报警几个功能。其中视觉分析部分利用OpenCV图像处理技术对采集得到的图像进行处理,根据图像中是否包含闯入者进行判别报警。如果判别出有非法闯入者,系统自动启动记录,将视频内容保存入磁盘,并通过串口通信将报警信号发送给单片机进行报警,危机解除后,停止写入磁盘,并解除单片机报警信号!-Project design and implementation of an intelligent intrusion alarm monitoring system. The system includes video capture, visual analysis and output the alarm a few features. One part of the visual analysis of image processing technology using OpenCV collected by the image processing, based on the image to determine whether the intruder alarm included. If you determine that an illegal intruder, the system automatically start the recording of video content saved to disk, and serial communication through the alarm the alarm signal is sent to the microcontroller, the lifting of the crisis, stop writing to disk, and lift the microcontroller alarm!
Platform: | Size: 1177600 | Author: 张宇 | Hits:

[Internet-NetworkTriple-springboard

Description: 网络入侵,安全第一。一个狡猾的、高明的入侵者,不会冒然实行动。他们在入侵时前会做足功课,入侵时会通过各种技术手段保护自己,以防被对方发现,引火烧身。其中,跳板技术是攻击者通常采用的技术。下面笔者结合实例,解析攻击入侵中的跳板技术-Network intrusion, safety first. A cunning, clever intruder, not the temerity to implement action. They will do their homework before the invasion, the invasion will be through a variety of technical means to protect themselves in case one was found burned. Where the attacker is usually the springboard technology is the technology used. Here the author with an example, parsing a springboard for attacks in the invasion of technology
Platform: | Size: 306176 | Author: 魍酆 | Hits:

[Technology Managementstage

Description: The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security considered essential. However, because of limited resources and low computing capacity of a sensor node, the development of a mechanism that ensures security is a real design challenges. In this report we have tried to propose a new security mechanism dedicated to WSN. Our main objective is to secure the process of transferring data to the base station. The proposed protocol protects transferred data against intruder nodes attacks, using a security mechanism based on the use of control message MAC (Message Authentication Code) for authentication. Our protocol performances are evaluated using the simulator NS2.
Platform: | Size: 2359296 | Author: magazana | Hits:

[JSP/JavaWirelessIntruderDetectionSystem

Description: Intruder Detection System
Platform: | Size: 50176 | Author: AKK | Hits:

[Speech/Voice recognition/combine61_Record

Description: 全自动语音商品介绍机,能自动介绍产品的信息,且能自动触发-langue intruder
Platform: | Size: 166912 | Author: 张伟 | Hits:

[Game ProgramInvasion_src

Description: 入侵者游戏编程,子弹与卷屏的设计,供初学者学习-Intruder game programming, bullets and scrolling design for beginners to learn
Platform: | Size: 580608 | Author: 王倩 | Hits:

[Technology Management2650houtai

Description: 2650多条路径和后台,适用网站入侵者,适用添加到扫描软件。-Over 2650 routes and backstage applicable website intruder, applies add to the scanning software.
Platform: | Size: 30720 | Author: 小陈 | Hits:

[Shot GameSpaceDestroyers

Description: 本游戏实现了玩家控制飞船对太空中的入侵者进行阻难,本游戏设有级别,能量包,生命包。可显示级别、积分生命值等。能量包是每隔3级出现一个,生命值每隔5级出现一个。-The game, players control the spacecraft space intruder resistance difficult, the game has a level of energy package, package of life. Can display level, the integral value of life. The energy package every 3, the value of life every 5 a.
Platform: | Size: 109568 | Author: wei | Hits:

[SCMzhi-neng-fang-dao-xi-tong

Description: 本系统通过红外热式传感器获取室内人员信息,并发送信号到单片机。单片机收到报警信息后通过要求人员输入密码的方式确定目标身份,并通过蜂鸣器报警的方式警示入侵者。另外,系统配备具手机通信功能的GSM模块,能将室内安全状况第一时间发送至用户手机终端。不仅大大提高系统安全性及智能性,也方便用户的使用。-The system is available through infrared sensors indoor personnel information, and sends a signal to the microcontroller. After the microcontroller receives alarm information to determine the identity of the target by requiring personnel to enter the password of the way, and by way of warning the intruder alarm buzzer. In addition, the system is equipped with a GSM mobile phone communication function module, the first time the security situation in the room can be sent to the user s mobile phone terminals. Not only greatly improve system security, and intelligence, but also user-friendly to use.
Platform: | Size: 55296 | Author: 黄俊明 | Hits:

[assembly languageSDFIZZVVF

Description: 行一个查询命令host。通过此命令,入侵者可获得保存在目标域服务器中的所有信息。其查询结果所含信息量的多少主要依靠于网络的大小和结构。 -Line a query command host. With this command, the intruder get all the information in the target domain server save. How much information is contained in its query results mainly depend on the size and structure of the network.
Platform: | Size: 5120 | Author: glen | Hits:

[assembly languageSFEFEQQQQ

Description: 行一个查询命令host。通过此命令,入侵者可获得保存在目标域服务器中的所有信息。其查询结果所含信息量的多少主要依靠于网络的大小和结构。 -Line a query command host. With this command, the intruder get all the information in the target domain server save. How much information is contained in its query results mainly depend on the size and structure of the network.
Platform: | Size: 6782976 | Author: glen | Hits:

[Crack Hacklsb

Description: lsb code..which helps in hiding the secret image within another image...so the image will be secured the intruder.-lsb code..which helps in hiding the secret image within another image...so the image will be secured the intruder.
Platform: | Size: 160768 | Author: aid | Hits:

[OtherRDH-BY-RRBE

Description: Nowadays, with the rapid growth in formation technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.-Nowadays, with the rapid growth in information technology more and more images and data are available on the internet. So there is a need to provide some kind of authentication to such important data. When the sender transmits the image to the receiver, there may be intruders present in between who may capture the image. After capturing the image the mage the intruder may view the meaningful content in the image. This may not be the problem in some cases. But if we consider security applications like medical and military images then such distortion is unacceptable. To avoid misuse or loss of information several reversible data hiding techniques (RDH) are implemented. This paper gives details on watermarking, LSB, Histogram and RDH using optimum Thresholding with related results.
Platform: | Size: 313344 | Author: Devarapu ChakraRao | Hits:

[OS programyuandaima

Description: 物流仓储视频监控智能检测系统主要是针对自动检测警戒区域的非法入侵而设计的,可应用于联网的无人值守的物流仓库的视频监控及自动报警。系统分为嵌入式视频监控器和远程客户端,在物流仓库的里面及周围边界都可以安装视频监控设备,远程工作人员通过网络在PC机上就可以实时监测机房里的及周边情况。当有人靠近时,不仅本地发出警报震慑入侵者,同时提醒客户端,并自动检测、记录入侵者的视频图像。-Logistics and warehousing intelligent video surveillance system is mainly aimed at detecting the illegal invasion of automatic detection of the warning area and design can be applied to networked unattended warehouse of video surveillance and alarm. Embedded system is divided into a video monitor and remote clients, and around inside the boundaries of logistics warehouse can be installed video surveillance equipment, remote workers via the network in real time on the PC can monitor the engine room and the surrounding circumstances. When someone approached, only local alarm to deter intruders, while reminding the client, and automatically detects, records video images intruder.
Platform: | Size: 75776 | Author: 李大振 | Hits:

[Web ServerInfoSec

Description: 拿来检查你的网站空间里指定类型的文件是否被人改动过,可以发现入侵者上传的Web后门及被其修改过的文件-Used to check your web space in the specified type of file is to be altered, you can find the intruder backdoor upload Web and by its modified files
Platform: | Size: 6144 | Author: yzfub | Hits:

[Web ServerFySqlX3

Description: 在v2.0增强版的基础上,加入了后台管理功能: 可以查看入侵者提交数据记录功能,解除对注入者ip封锁,以及删除注入记录功能 v3.0修正版更新修正了封ip的一个Bug v3.0正式版更新针对用户提出的问题做了一点补充-In the enhanced version v2.0 based on adding background management functions: You can view the intruder submit data logging capabilities, the lifting of the blockade injected by ip, and delete injection record v3.0 revision update fixes a Bug closure of ip v3.0 update for the official version of the issue raised by users to do a little supplement
Platform: | Size: 13312 | Author: tgspd | Hits:

[Web Serverworld163Security

Description: 用于系统防注入,可抵御从Get方法或Post方法提交的危险SQL注入字符,并转向到Danger.asp(入侵提示)页面以警告入侵者,并记录入侵者的IP与侵入时间,拥有数量为170152条记录的IP数据库-For anti-injection system can withstand the risk of SQL submitted a Get or Post method injection method character, and turned to Danger.asp (intrusion tips) page to warn intruders, and record the IP with the intruder invasion time, with the number of IP recorded 170 152
Platform: | Size: 1795072 | Author: skpie | Hits:

[ELanguageLOGINTIME

Description: 1.LOGINTIME.zip= This program gives the login time of the account accessed if the password is right and if its wrong it sends an message stating wrong intruder entered.The login details will be stored in a file in the excel sheet which can be viewed for safety purpose.Its almost like a pseudo account with login details and time.
Platform: | Size: 1024 | Author: CHANDAN YADAV | Hits:

[Web Serversql20051201

Description: 增加了自动封注入者Ip功能,使注入者不能再访问本站! 3.0版 在2.0增强版的基础上,加入了后台管理功能: 可以查看入侵者提交数据记录功能,解除对注入者ip封锁,以及删除注入记录功能! 3.0修正版 修正了封ip的一个Bug! 3.0正式版 针对用户提出的问题做了一点补充! 3.1 β版 加入对cookie部分的过滤,加入了对用js书写的asp程序的支持,加入了对安全表单的取消过滤! -Increased automatic seal injector Ip function, so that the injector can no longer visit the site! 3.0 version 2.0 enhanced version, based on the added background management functions: you can view the intruder to submit data logging function, to unlock the ip blocker, and delete the injection record! 3.0 revised version Fixed a bug ip ip! 3.0 official version of the problem for the user made a little added! 3.1 beta version of the cookie part of the filter, joined the use of js written asp program support, joined the security Form of the cancellation filter!
Platform: | Size: 16384 | Author: vmc | Hits:

[Web ServerASPSecurity

Description: 1、ASP木马查找(能够查出现在几乎所有的ASP木马) 2、文件篡改检查 3、可疑文件搜索 4、Access数据库保护 5、记录入侵者信息-1, ASP Trojan search (to find out almost all of the ASP Trojan) 2, file tampering check 3, suspicious file search 4, Access protection 5, record intruder information
Platform: | Size: 81920 | Author: dhr | Hits:
« 1 23 »

CodeBus www.codebus.net