Description: IP端口号扫描工具
可以扫描指定网段指定的端口号是否开放。
有助更好的维护网络的安全。-IP port scanning tool
You can scan the specified port number specified segment is open.
Help to better maintain network security.
Platform: |
Size: 833536 |
Author:sbfangjun |
Hits:
Description: 企业网络安全风险评价,详细描述了企业网络中存在的风险安全问题,内容详细-Enterprise network safety risk assessment, a detailed description of the risk in the business enterprise network security problems, detailed text
Platform: |
Size: 20480 |
Author:liuman |
Hits:
Description: 1、定位
全方位、非商业而且有自己独特风格的黑客及安全站点。
2、目的
a、整理和发掘网络安全、黑客方面技术文献及工具、代码。
b、发布我们——包括任何一个对安全有想法的朋友——的想法和发现,为大家提供发布文章及安全、黑客相关工具的园地。
c、结识更多有共同志向的朋友,共同研究、讨论网络安全的方方面面。
-1, positioning
All-round, non-commercial and has its own unique style of hacking and security sites.
2, the purpose of
a, organize and explore the network security, hacker tools for technical documentation and code.
b, release us- including the idea of any security with a friend- ideas and discoveries, as we publish articles and provide security, hacking tools of garden.
c, a common ambition to get to know more friends, to study, discuss all aspects of network security.
Platform: |
Size: 18674688 |
Author: |
Hits:
Description: 本文是无线网络密码破解傻瓜图文只做技术交流之用,提醒各位注意无线网络安全性,请勿用于其他用途,否则后果自负。 -This paper is a wireless network password crackers and technical exchanges only a fool with, remind you pay attention to the wireless network security, and do not use it for other purposes, otherwise the consequence is proud.
Platform: |
Size: 421888 |
Author:林浪 |
Hits:
Description: 提供的代码是编写一个基于linux系统的网络视频点播应用程序,利用Qt工具编写图形界面和基于TCP协议的网络传输模块。Linux操作系统以其开源性、多用户多任务、支持多种硬件平台、可靠地安全稳定性能以及日趋完善的图形界面和丰富的网络功能等等,逐渐成为了各行业的首选操作系统,尤其是基于ARM内核的嵌入式linux更是得到了极为广泛的应用。
本系统分为服务器端和客户端两部分。服务器端提供多视频源,供用户进行选择,客户端提供人机交互界面,当用户需要点播某个视频时,首先在Ip Address栏输入服务器的Ip地址,然后选择movies栏的下拉框,从视频列表中选择相应的视频目录,接着点击play按钮,一段缓冲之后开始播放视频,这样就完成了点播功能。-The code is written to provide a linux-based VOD system, applications, graphical user interface written using Qt tools and TCP-based network transmission module. Its open-source Linux operating system, multi-user multi-tasking, support multiple hardware platforms, reliable performance, and increasing security and stability improved graphical interface and a rich network functionality, etc., has become the operating system of choice for various industries, especially ARM core-based embedded linux is to get a very wide range of applications.
The system is divided into server and client in two parts. Server to provide multiple video sources for users to choose, the client provides interactive interface, users need a video on demand, the first in the Ip Address field, enter the server s Ip address, then select the movies column drop-down box, from video list, select the appropriate video directory, then click the play button, a buffer after the video starts playing, thus completing t Platform: |
Size: 8192 |
Author:nie |
Hits:
Description: This literature review glances at the research that has been published in the area of chaos cryptography along with
cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the
designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption
techniques. This review analyzes the role that chaotic cryptosystem has played and will play in the future relative to the
security. By reviewing the papers, it is the objective to design a number of secured cryptosystem based on different families
of chaotic sequences using various encryption techniques. The work can arrive with more efficient and robust chaotic
cryptosystem so as to provide data security, privacy and to preserve the future of network security and prevail secured
communication networking. Platform: |
Size: 92160 |
Author:ahsun |
Hits:
Description: Abstract
Developing technologies in the field of network security. The
main motive of this paper to instigate the fast developing
cryptography researchers and to increase the security
development in the field of information security. In this article, a
serious discussion about the comparison between ECC and other
cryptography algorithms is attempted to shaped this article. More
over, this article explains the role in the network security. ECC’s
uses with smaller keys to provide high security, high speed in a
low bandwidth. Platform: |
Size: 181248 |
Author:ahsun |
Hits:
Description: :一个命令行的SQL注入工具源码,对于想学习网络安全编程的人来说有参考价值。--A command-line source of SQL injection tool, for want to learn programming, network security for a valuable reference. Platform: |
Size: 5120 |
Author:samy |
Hits:
Description: 详细介绍了多接收认证的原理应用,构造了实用的多接收认证码-Detailed introduces the principle of receiving application authentication, constructed of receiving the authentication code more practical Platform: |
Size: 937984 |
Author:Quincy |
Hits:
Description: Network processing units (NPUs) will be the occasion of sweeping changes in the network hardware industry over the next few years. This new breed of microchip impacts chip designers like Intel, equipment vendors like Cisco, application developers like IBM and Morotola, and an army of software engineers who spent the last decade working on protocols and network management solutions. A thoroughly practical dissection of the early NPU market, this designer s guide explains how network processors work and provides detailed information on all major commercial architectures, from features to design considerations. Comparative tables are a rich source of cross-industry info. Coverage includes traffic managers, classification chips, content-addressable memories, switch fabrics, security accelerators, storage coprocessors and NetASICs. Platform: |
Size: 2688000 |
Author:Globalcitizen |
Hits:
Description: download a book in security
Cryptography and Network Security Principles and Practice 5th_Edition
useful book Platform: |
Size: 6877184 |
Author:farshad |
Hits:
Description: 介绍网络安全管理应用,能了解网络安全管理应用-Introduction to network security management application,To be able to understand the network security management application Platform: |
Size: 1005568 |
Author:王欢欢 |
Hits:
Description: 个人收藏的俩个病毒代码文件,大家放心绝对没毒,对网络安全有兴趣的可以研究一下-A personal collection of two virus code file, rest assured that no poison, to network security are interested can look at... Platform: |
Size: 593920 |
Author:李明 |
Hits:
Description: 采用主动式红外传感器进行检测,并配备烟雾传感器和燃气泄漏传感器,实现防火、防燃气泄漏的作用。-Active infrared sensors to detect, and change the traditional anti-theft network security windows tangible for the intangible, to the fire escape. And equipped with smog sensor and gas leak sensors, fire prevention, the role of gas leak. Platform: |
Size: 175104 |
Author:ghh |
Hits:
Description: 信心安全实验分组密码,嗅探器,网络安全,实验报告流程详细分析各结果显示-Confidence in the safety of experimental block cipher, sniffer, network security, laboratory reporting process detailed analysis of all results showed that Platform: |
Size: 1864704 |
Author:李 |
Hits: