Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[Crack HackMD5andRSA

Description: 网络信息与安全技术中的MD5算法和RSA算法的java实现-information and network security technology and the RSA algorithm MD5 algorithm to achieve the java
Platform: | Size: 24576 | Author: wuxianyou | Hits:

[Internet-NetworkAgoBot

Description: 国外搜集的著名的botnet(也就是僵尸网络)源代码,其实是一个完整的木马,加上自动传播,控制方式不是传统的木马控制方式,而是通过IRC控制的,很有意思,要注意,只能用于学习,不能用来搞破坏哦-Abroad to collect the well-known botnet (zombie network that is) the source code, in fact, is a complete horse, together with the automatic transmission, control of the horse rather than the traditional control method, but through the IRC-controlled, it is interesting to note that only can be used to study, can not be used to sabotage Oh
Platform: | Size: 4214784 | Author: 野草 | Hits:

[OS programnetworksecurity

Description: 网络安全及体系构成,比较详细地分析了网络安全的一些内容-Network security and system of composition, a more detailed analysis of some of the elements of network security
Platform: | Size: 1512448 | Author: 陈晓峰 | Hits:

[JSP/Javajavachat

Description: 利用目前即时通讯工具在互联网上使用的广泛、便利、易用受欢迎的特点,结合了Java语言(Java 2 Standard Edition)的易用特点与性能优势,比如跨平台、安全性、多线程、网络Socket编程、流概念等方面,来设计基于Java虚拟机可跨平台特性的即时通讯工具,并对其体系结构、构成模块及系统关键技术进行了分析与设计。该系统具有安全、高效、实用、支持在不同系统平台运行等特点。 关键词:J2SE、即时通讯、跨平台(一次编写、到处执行)、多线程、JICQ -To take advantage of instant messaging tools on the Internet using a broad, convenient, easy-to-use popular features, a combination of Java language (Java 2 Standard Edition) The easy-to-use features and performance advantages, such as cross-platform, security, multi-threaded, Network Socket programming, the concept of flow, etc., to design based on the Java virtual machine can be cross-platform features of instant messaging tools, and architecture, modules and systems constitute a key technology for the analysis and design. The system has safe, efficient, practical and support the operation of different system platforms and so on. Key words: J2SE, instant messaging, cross-platform (write once, everywhere Executive), multi-threaded, JICQ
Platform: | Size: 309248 | Author: zengji | Hits:

[Otherrsa

Description: 网络安全体制中的RSA算法的一些相关文章-Network security system of the RSA algorithm in a number of related articles
Platform: | Size: 4818944 | Author: | Hits:

[Internet-NetworkOnItFirewall

Description: 程序功能齐全很专业。支持监控包括传输控制协议和 UDP 的所有的互联网传输协议。同时程序具有实时文件防修改监控功能,可以杜绝其他程序对主要系统文件的修改,而且你可以进行一键还原。同时和一些商业版的防火墙一样,支持以IP地址和端口的规则设置。可以自动屏蔽一些端口,系统提供了人性化的温馨入侵提示,如告诉你危险程序,是否安全以及等级等等。 该防火墙还具有检测你的网络速度,可以实时查看每一个连接IP的网速,最主要的是非常快速并且稳定-Procedures for full-featured very professional. Support for monitoring, including Transmission Control Protocol and UDP all Internet Transfer Protocol. At the same time, with real-time document the procedures to amend anti-monitoring function, can be prevented in the other programs on the major changes to system files, and you can be a key to restore. At the same time and some, like the commercial version of the firewall, support for IP address and port set the rules. Can automatically shield some ports, the system provides a warm human invasion prompted, such as the risk of the procedure to tell you whether the level of security and so on. The firewall also has detected the speed of your network, you can connect in real-time view of every IP network speed, the most important thing is very fast and stable
Platform: | Size: 1018880 | Author: 浪子 | Hits:

[Othernetsecurity

Description: 网络安全教程(国家信息化安全内部资料),是我培训时拿回来的,和大家共享。-Network Security Guide (national security information-based internal information), is training when I get back, and everyone shared.
Platform: | Size: 4794368 | Author: green | Hits:

[Internet-Networkddos

Description: 此程序为DDoS的源程序,对网络安全感兴趣的人可以参考-This procedure for the source of the DDoS, network security for people who are interested can refer to
Platform: | Size: 997376 | Author: 马润杰 | Hits:

[Windows DevelopExplorer

Description: 这是一个网络资源管理器,实现互联网,也就是浏览器方式下的、类似WINDOWS资源管理器的功能。使用互联网方式有很多好处,方便安全,不需要共享文件夹,从而使由于共享带来的病毒传播。安全保密性不高,文件传递不方便的问题得到了解决-This is a network resource manager, the realization of the Internet, that is, the browser mode, similar to WINDOWS resource management functions. There are many ways to use the benefits of the Internet to facilitate the safe, do not need a shared folder, so that sharing brought about as a result of the spread of the virus. Security confidentiality is not high, the document inconvenient transfer problem has been resolved
Platform: | Size: 239616 | Author: 发放日 | Hits:

[OS programsee

Description: 基于TTL分析的计算机网络应用研究..本文在对国内外TTL应用情况进行分析的基础上,讨论并模拟实现了TTL在网络故障诊断和网络安全方面的应用。-TTL-based analysis of application of computer networks at home and abroad .. In this paper, the application of an analysis of TTL on the basis of the discussion and simulation of the realization of the TTL in the network fault diagnosis and network security applications.
Platform: | Size: 1485824 | Author: 042201111232 | Hits:

[VC/MFCy1547741

Description: 移动自组织网AODV协议的优化设计与仿真测试-Mobile Ad Hoc Network Optimization AODV protocol design and simulation test
Platform: | Size: 485376 | Author: huayanchun | Hits:

[Internet-Networkseclib-1.0.0

Description: 一个用于网络安全方面的SSL,TLS库.可以用来做FTPS, WEB Server等等d-One for the network security aspects of SSL, TLS library. Can be used to do FTPS, WEB Server, etc. d
Platform: | Size: 518144 | Author: Euler | Hits:

[Proxy Servertinyproxy-1.4.0pre2.tar

Description: tinyproxy is a small, efficient HTTP proxy daemon. tinyproxy is very useful in a small network setting, where a larger proxy like Squid would either be too resource intensive, or a security risk. One of the key features of tinyproxy is the buffering connection concept. In effect, tinyproxy will buffer a high speed response from a server, and then relay it to a client at the highest speed the client will accept. This feature greatly reduces the problems with sluggishness on the Internet. If you are sharing an Internet connection with a small network, and you only want to allow HTTP requests to be allowed, then tinyproxy is a great tool for the network administrator. -tinyproxy is a small, efficient HTTP proxy daemon. tinyproxy is very useful in a small network setting, where a larger proxy like Squid would either be too resource intensive, or a security risk. One of the key features of tinyproxy is the buffering connection concept . In effect, tinyproxy will buffer a high speed response from a server, and then relay it to a client at the highest speed the client will accept. This feature greatly reduces the problems with sluggishness on the Internet. If you are sharing an Internet connection with a small network, and you only want to allow HTTP requests to be allowed, then tinyproxy is a great tool for the network administrator.
Platform: | Size: 184320 | Author: wzq | Hits:

[Windows Developrainhips2.06Src

Description: 禹盾hips是一个完全免费且开放源代码的主机入侵防御系统,利用禹盾hips可以保护您的系统免受病毒入侵。他是一种能监控你电脑中文件的运行和文件运用了其他的文件以及文件对注册表的修改,并向你报告请求允许的的软件。如果你阻止了,那么它将无法运行或者更改。比如你双击了一个病毒程序,HIPS软件跳出来报告而你阻止了,那么病毒还是没有运行的。引用一句话:”病毒天天变种天天出新,使得杀软可能跟不上病毒的脚步,而HIPS能解决这些问题。”。 HIPS是以后系统安全发展的一种趋势,只要你有足够的专业水平,你可以只用HIPS而不需杀毒软件。但是HIPS并不能称为防火墙,最多只能叫做系统防火墙,它不能阻止网络上其他计算机对你计算机的攻击行为。-Yu hips Shield is a completely free and open source host intrusion defense systems, the use of hips Yu shield to protect your system from viruses. He is a computer you can monitor the operation and file documents the use of the documents and other files on the registry changes, and requested permission to report to you the software. If you stop, then it will be unable to run or change. For example, you double-click on a virus program, HIPS software to report and you jump out of a block, then run the virus or not. Quoted saying: "HIV every day, every day a new variant, the soft-kill virus could not keep up the pace, and HIPS can solve these problems.". HIPS is a system security after the development of a trend, as long as you have sufficient professional level, you can only HIPS without antivirus software. However, HIPS and firewall can not be called up to the system can only be called a firewall, it can not prevent other computer network attacks on your computer.
Platform: | Size: 1290240 | Author: zzage | Hits:

[Otherczgl

Description: 称重管理系统是一套结合电子衡器日常操作习惯和企业计量管理要求专业开发的微机称重管理软件。本系统面向非专业操作人员编写,界面友好直观,操作流程完全等同于司磅人员的日常操作习惯,操作人员无需培训即可参照软件简单明了的人机交互界面投入实际应用,软件具备完善的数据安全检测恢复机制,对操作、管理人员没有任何特殊的素质要求。针对当前许多厂矿企业对衡的综合管理的要求,杜绝人为因素,确保计量管理的科学性与准确性 MS Access 数据库实现的中小型局域网的联机称重以及记录查询的管理   本软件通过对称重数据的自动采集、远距离车号自动认别、称重现场视频监控、红外线自动定位等功能实现电子工业汽车衡的智能称重管理,并且从企业产品的生产、销售、发运、原材料入库、财务结算、客户管理等信息进行综合处理,可以实现网络定单、远程审批认证、网络称量监控等功能。-Weight Management System is a combination of day-to-day operation of the electronic scales measuring habits and business management requirements of the computer weighing professional development management software. The system operator for the preparation of non-professional, friendly and intuitive interface, operation processes Secretary pounds exactly the same as the day-to-day operation of customary personnel, operators need training software can be simple and clear reference to the man-machine interface into practical applications, the software has the Detection of the restoration of data security mechanisms, operation, management does not require any special qualities. Many factories and mines for the current value of the integrated management of the request, put an end to human factors to ensure that the management of scientific measurement and the accuracy of MS Access database to achieve the small and medium-sized local area network, as well as records of online weight manageme
Platform: | Size: 6010880 | Author: 孙博 | Hits:

[OtherPPTgsaa

Description: 介绍网络安全漏洞扫描的原理的PPT,供大家学习使用-Network security vulnerability scanning, introduced the principle of the PPT, for them to learn from the use of
Platform: | Size: 86016 | Author: 李晟 | Hits:

[Crack HackRSA

Description: This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
Platform: | Size: 15360 | Author: Maimouna | Hits:

[Crack Hackfile_transfer

Description: 这是网络信息安全课程写的一个给文件加密传输的源代码,可以在局域网中进行文件传输,文件可以选择是否加密,很好的学习DES加密的源代码程序。-This is the network information security courses to write a file encryption to transfer the source code can be carried out in the local area network file transfer, file encryption can choose whether or not, good learning of the source code for DES encryption process.
Platform: | Size: 220160 | Author: | Hits:

[Firewall-Securityfirewall

Description: 专业味十足的一款防火墙软件,用VB语言开发,保护你的计算机安全。可以限定规则,适合监视应用程序及网络端口的功能。-The full flavor of a professional firewall using VB language development, the protection of your computer security. Can define the rules for application and network monitoring functions of the port.
Platform: | Size: 574464 | Author: 651 | Hits:

[BooksWSNsleach

Description: 基于无线传感器网络的一种安全路由协议 针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协 议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安 全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出 现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能. -Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security .
Platform: | Size: 522240 | Author: 池尚琨 | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 50 »

CodeBus www.codebus.net