Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[Internet-Network2011113918864

Description: IP端口号扫描工具 可以扫描指定网段指定的端口号是否开放。 有助更好的维护网络的安全。-IP port scanning tool You can scan the specified port number specified segment is open. Help to better maintain network security.
Platform: | Size: 833536 | Author: sbfangjun | Hits:

[ERP-EIP-OA-PortalISA

Description: 企业网络安全风险评价,详细描述了企业网络中存在的风险安全问题,内容详细-Enterprise network safety risk assessment, a detailed description of the risk in the business enterprise network security problems, detailed text
Platform: | Size: 20480 | Author: liuman | Hits:

[Internet-Networkhacker-tools

Description: 真正可用的灰鸽子,亲自测试,无后门,缺点是只能适用与内网,速度性能很不错。-hacker, network security,tools
Platform: | Size: 5783552 | Author: Leo | Hits:

[OS programcomputer-security

Description: 关于计算机通信网络安全与防护策略的几点思考-On computer security and communications network protection strategy Thoughts
Platform: | Size: 256000 | Author: 快点 | Hits:

[Crack Hackcourse-577.fb2

Description: control encryption keys and network security
Platform: | Size: 5777408 | Author: lifemanship | Hits:

[assembly languagexfocus

Description: 1、定位 全方位、非商业而且有自己独特风格的黑客及安全站点。 2、目的 a、整理和发掘网络安全、黑客方面技术文献及工具、代码。 b、发布我们——包括任何一个对安全有想法的朋友——的想法和发现,为大家提供发布文章及安全、黑客相关工具的园地。 c、结识更多有共同志向的朋友,共同研究、讨论网络安全的方方面面。 -1, positioning All-round, non-commercial and has its own unique style of hacking and security sites. 2, the purpose of a, organize and explore the network security, hacker tools for technical documentation and code. b, release us- including the idea of ​ ​ any security with a friend- ideas and discoveries, as we publish articles and provide security, hacking tools of garden. c, a common ambition to get to know more friends, to study, discuss all aspects of network security.
Platform: | Size: 18674688 | Author: | Hits:

[Crack HackWirelessRoutingPasswordDecryption

Description: 本文是无线网络密码破解傻瓜图文只做技术交流之用,提醒各位注意无线网络安全性,请勿用于其他用途,否则后果自负。 -This paper is a wireless network password crackers and technical exchanges only a fool with, remind you pay attention to the wireless network security, and do not use it for other purposes, otherwise the consequence is proud.
Platform: | Size: 421888 | Author: 林浪 | Hits:

[Linux-Unixnetwork-video--player

Description: 提供的代码是编写一个基于linux系统的网络视频点播应用程序,利用Qt工具编写图形界面和基于TCP协议的网络传输模块。Linux操作系统以其开源性、多用户多任务、支持多种硬件平台、可靠地安全稳定性能以及日趋完善的图形界面和丰富的网络功能等等,逐渐成为了各行业的首选操作系统,尤其是基于ARM内核的嵌入式linux更是得到了极为广泛的应用。 本系统分为服务器端和客户端两部分。服务器端提供多视频源,供用户进行选择,客户端提供人机交互界面,当用户需要点播某个视频时,首先在Ip Address栏输入服务器的Ip地址,然后选择movies栏的下拉框,从视频列表中选择相应的视频目录,接着点击play按钮,一段缓冲之后开始播放视频,这样就完成了点播功能。-The code is written to provide a linux-based VOD system, applications, graphical user interface written using Qt tools and TCP-based network transmission module. Its open-source Linux operating system, multi-user multi-tasking, support multiple hardware platforms, reliable performance, and increasing security and stability improved graphical interface and a rich network functionality, etc., has become the operating system of choice for various industries, especially ARM core-based embedded linux is to get a very wide range of applications. The system is divided into server and client in two parts. Server to provide multiple video sources for users to choose, the client provides interactive interface, users need a video on demand, the first in the Ip Address field, enter the server s Ip address, then select the movies column drop-down box, from video list, select the appropriate video directory, then click the play button, a buffer after the video starts playing, thus completing t
Platform: | Size: 8192 | Author: nie | Hits:

[OS programNSTS

Description: 这是一个综合的网络安全工具,使用C Sharp编程,实现网络扫描、协议分析、远程控制等等功能。-This is a comprehensive network security tools, use C Sharp programming, realize network scanning and protocol analysis, remote control, etc. Function.
Platform: | Size: 3335168 | Author: 林场 | Hits:

[CA auth8-Mina_Mishra

Description: This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role that chaotic cryptosystem has played and will play in the future relative to the security. By reviewing the papers, it is the objective to design a number of secured cryptosystem based on different families of chaotic sequences using various encryption techniques. The work can arrive with more efficient and robust chaotic cryptosystem so as to provide data security, privacy and to preserve the future of network security and prevail secured communication networking.
Platform: | Size: 92160 | Author: ahsun | Hits:

[CA auth20090603

Description: Abstract Developing technologies in the field of network security. The main motive of this paper to instigate the fast developing cryptography researchers and to increase the security development in the field of information security. In this article, a serious discussion about the comparison between ECC and other cryptography algorithms is attempted to shaped this article. More over, this article explains the role in the network security. ECC’s uses with smaller keys to provide high security, high speed in a low bandwidth.
Platform: | Size: 181248 | Author: ahsun | Hits:

[OS programsqlinject

Description: :一个命令行的SQL注入工具源码,对于想学习网络安全编程的人来说有参考价值。--A command-line source of SQL injection tool, for want to learn programming, network security for a valuable reference.
Platform: | Size: 5120 | Author: samy | Hits:

[Software Engineeringnetwork-security

Description: 详细介绍了多接收认证的原理应用,构造了实用的多接收认证码-Detailed introduces the principle of receiving application authentication, constructed of receiving the authentication code more practical
Platform: | Size: 937984 | Author: Quincy | Hits:

[Program docNetwork-Processors--Architectures--Protocols-and-

Description: Network processing units (NPUs) will be the occasion of sweeping changes in the network hardware industry over the next few years. This new breed of microchip impacts chip designers like Intel, equipment vendors like Cisco, application developers like IBM and Morotola, and an army of software engineers who spent the last decade working on protocols and network management solutions. A thoroughly practical dissection of the early NPU market, this designer s guide explains how network processors work and provides detailed information on all major commercial architectures, from features to design considerations. Comparative tables are a rich source of cross-industry info. Coverage includes traffic managers, classification chips, content-addressable memories, switch fabrics, security accelerators, storage coprocessors and NetASICs.
Platform: | Size: 2688000 | Author: Globalcitizen | Hits:

[Crack Hackebooksclub.org__Cryptography_and_Network_Security

Description: download a book in security Cryptography and Network Security Principles and Practice 5th_Edition useful book
Platform: | Size: 6877184 | Author: farshad | Hits:

[OS programsb

Description: 介绍网络安全管理应用,能了解网络安全管理应用-Introduction to network security management application,To be able to understand the network security management application
Platform: | Size: 1005568 | Author: 王欢欢 | Hits:

[Anti-virusxiao-dai-ma

Description: 个人收藏的俩个病毒代码文件,大家放心绝对没毒,对网络安全有兴趣的可以研究一下-A personal collection of two virus code file, rest assured that no poison, to network security are interested can look at...
Platform: | Size: 593920 | Author: 李明 | Hits:

[Internet-Networknessus-core-2.0.9

Description: nessus scanner network security core source-nessus scanner core for linux
Platform: | Size: 1482752 | Author: 张同 | Hits:

[Software Engineeringsystem-based-on-GSM-SMS-module

Description: 采用主动式红外传感器进行检测,并配备烟雾传感器和燃气泄漏传感器,实现防火、防燃气泄漏的作用。-Active infrared sensors to detect, and change the traditional anti-theft network security windows tangible for the intangible, to the fire escape. And equipped with smog sensor and gas leak sensors, fire prevention, the role of gas leak.
Platform: | Size: 175104 | Author: ghh | Hits:

[OS programDES.RAR

Description: 信心安全实验分组密码,嗅探器,网络安全,实验报告流程详细分析各结果显示-Confidence in the safety of experimental block cipher, sniffer, network security, laboratory reporting process detailed analysis of all results showed that
Platform: | Size: 1864704 | Author: | Hits:
« 1 2 ... 45 46 47 48 49 50»

CodeBus www.codebus.net