Welcome![Sign In][Sign Up]
Location:
Search - network attacks

Search list

[OS program用于模拟GETPOST方法发送HTTP请求并取得数据

Description: 用于模拟GETPOST方法发送HTTP请求并取得数据.可能用于网络攻击-GETPOST simulation methods for sending HTTP request and obtain data. May be used in network attacks
Platform: | Size: 303390 | Author: 李昱 | Hits:

[Othersniff_snort

Description: 嗅探是网络攻击中的重要环节,该代码完整介绍的嗅探的全过程。-Sniffer network attacks is an important part of the code introduced by sniffer integrity of the entire process.
Platform: | Size: 5299 | Author: haugnwm | Hits:

[Software Engineering10517-080605-0303B01-27

Description: 通过介绍网络上几种常见的攻击方式(电子欺骗攻击、拒绝服务攻击、同步攻击、Web欺骗攻击、密码攻击、木马程序攻击等),然后就这些攻击方式提出相应的防范措施,最后就个人防范网络攻击提出了一些相关的策略。本文从以上方面来阐述在网络给人们带来诸多好处的同时,也带来了一些不可避免的负面影响,本文主要是为了有效地防范网络攻击,维护自己的权益不受侵犯,就需要我们尽量了解网络攻击的各种原理和手段、网络中存在的各种漏洞,以便及时维护我们的系统。 关键字:网络安全,网络攻击,防范措施 -by introducing several common network attacks means (electronic deception attacks, denial of service attacks, simultaneous attacks, Web spoofing, password attacks, Trojan program attack), then these attacks manner corresponding preventive measures, Finally on personal networks for a number of attacks related to the strategy. This paper described above in connection to the network to bring many advantages, also brought some unavoidable adverse effects, the paper is mainly to effectively prevent network attacks, safeguard their rights and interests are not violated, we need to try to understand the various network attacks principle and means network the various loopholes that exist, in order to safeguard our systems. Keywords : network security, network attacks, and prevention measures
Platform: | Size: 44117 | Author: 陆雪 | Hits:

[Exploitpersonal_firewall

Description: 个人实现的一个简单的个人防火墙,可以抵抗基本常规的网络攻击,适合初学者学习。-personal realization of a simple personal firewall, protecting basic conventional network attacks, for beginners learning.
Platform: | Size: 46507 | Author: 张华 | Hits:

[CommunicationNetworkAttack

Description: 对常见网络攻击手段原理进行了比较详细的分析,大家可以参考学习。-common network attacks on the principle means of a more detailed analysis, you can refer to the study.
Platform: | Size: 14445 | Author: 哈吉 | Hits:

[Remote Controllzm_doc

Description: 网络攻击的客户和服务器端-network attacks and server-client
Platform: | Size: 2652627 | Author: 房客 | Hits:

[Internet-NetworkAttacker

Description: 网络攻击SOKET编程实例- The network attacks the SOKET programming example
Platform: | Size: 96256 | Author: 王宇 | Hits:

[Remote Controllzm_doc

Description: 网络攻击的客户和服务器端-network attacks and server-client
Platform: | Size: 2652160 | Author: 房客 | Hits:

[OS program用于模拟GETPOST方法发送HTTP请求并取得数据

Description: 用于模拟GETPOST方法发送HTTP请求并取得数据.可能用于网络攻击-GETPOST simulation methods for sending HTTP request and obtain data. May be used in network attacks
Platform: | Size: 303104 | Author: | Hits:

[Othersniff_snort

Description: 嗅探是网络攻击中的重要环节,该代码完整介绍的嗅探的全过程。-Sniffer network attacks is an important part of the code introduced by sniffer integrity of the entire process.
Platform: | Size: 5120 | Author: | Hits:

[Internet-Networkcnsrf

Description: The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses. -The Network Security Response Framework ( NSRF) allows for testing different computer se curity response engines and methodologies. It supports simulated and real : Intrusion Detection Systems (sensors). Attacks, and Responses.
Platform: | Size: 1217536 | Author: 高铁柱 | Hits:

[Software Engineering10517-080605-0303B01-27

Description: 通过介绍网络上几种常见的攻击方式(电子欺骗攻击、拒绝服务攻击、同步攻击、Web欺骗攻击、密码攻击、木马程序攻击等),然后就这些攻击方式提出相应的防范措施,最后就个人防范网络攻击提出了一些相关的策略。本文从以上方面来阐述在网络给人们带来诸多好处的同时,也带来了一些不可避免的负面影响,本文主要是为了有效地防范网络攻击,维护自己的权益不受侵犯,就需要我们尽量了解网络攻击的各种原理和手段、网络中存在的各种漏洞,以便及时维护我们的系统。 关键字:网络安全,网络攻击,防范措施 -by introducing several common network attacks means (electronic deception attacks, denial of service attacks, simultaneous attacks, Web spoofing, password attacks, Trojan program attack), then these attacks manner corresponding preventive measures, Finally on personal networks for a number of attacks related to the strategy. This paper described above in connection to the network to bring many advantages, also brought some unavoidable adverse effects, the paper is mainly to effectively prevent network attacks, safeguard their rights and interests are not violated, we need to try to understand the various network attacks principle and means network the various loopholes that exist, in order to safeguard our systems. Keywords : network security, network attacks, and prevention measures
Platform: | Size: 44032 | Author: 陆雪 | Hits:

[Internet-Networknetcap

Description: windows下网络包捕获源代码,可以捕获所有网络数据包,以便分析,谁对本机的攻击.-windows of network packet capture the source code, you can catch all network data packets to the analysis, Who of the plane attacks.
Platform: | Size: 64512 | Author: tb | Hits:

[Internet-Networkpersonal_firewall

Description: 个人实现的一个简单的个人防火墙,可以抵抗基本常规的网络攻击,适合初学者学习。-personal realization of a simple personal firewall, protecting basic conventional network attacks, for beginners learning.
Platform: | Size: 46080 | Author: 张华 | Hits:

[Program docNetworkAttack

Description: 对常见网络攻击手段原理进行了比较详细的分析,大家可以参考学习。-common network attacks on the principle means of a more detailed analysis, you can refer to the study.
Platform: | Size: 14336 | Author: 哈吉 | Hits:

[Internet-Networkiids

Description: 加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
Platform: | Size: 930816 | Author: yu | Hits:

[OtherWormhole_Simulation_Code

Description: This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004. -This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
Platform: | Size: 41984 | Author: 旺老财 | Hits:

[Windows Developrainhips2.06Src

Description: 禹盾hips是一个完全免费且开放源代码的主机入侵防御系统,利用禹盾hips可以保护您的系统免受病毒入侵。他是一种能监控你电脑中文件的运行和文件运用了其他的文件以及文件对注册表的修改,并向你报告请求允许的的软件。如果你阻止了,那么它将无法运行或者更改。比如你双击了一个病毒程序,HIPS软件跳出来报告而你阻止了,那么病毒还是没有运行的。引用一句话:”病毒天天变种天天出新,使得杀软可能跟不上病毒的脚步,而HIPS能解决这些问题。”。 HIPS是以后系统安全发展的一种趋势,只要你有足够的专业水平,你可以只用HIPS而不需杀毒软件。但是HIPS并不能称为防火墙,最多只能叫做系统防火墙,它不能阻止网络上其他计算机对你计算机的攻击行为。-Yu hips Shield is a completely free and open source host intrusion defense systems, the use of hips Yu shield to protect your system from viruses. He is a computer you can monitor the operation and file documents the use of the documents and other files on the registry changes, and requested permission to report to you the software. If you stop, then it will be unable to run or change. For example, you double-click on a virus program, HIPS software to report and you jump out of a block, then run the virus or not. Quoted saying: "HIV every day, every day a new variant, the soft-kill virus could not keep up the pace, and HIPS can solve these problems.". HIPS is a system security after the development of a trend, as long as you have sufficient professional level, you can only HIPS without antivirus software. However, HIPS and firewall can not be called up to the system can only be called a firewall, it can not prevent other computer network attacks on your computer.
Platform: | Size: 1290240 | Author: zzage | Hits:

[SCMneta_v1-1.0.tar

Description: Network Attack Model for omnetpp
Platform: | Size: 3112960 | Author: CommsMan | Hits:

[matlabcomplex network

Description: 实现复杂网络受随机攻击和蓄意攻击的仿真结果分析。(The simulation results of complex networks subjected to random attacks and deliberate attacks are analyzed.)
Platform: | Size: 34816 | Author: 游泳的鱼111 | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net