Welcome![Sign In][Sign Up]
Location:
Search - packet pass

Search list

[WinSock-NDISWpdPack_3_2_alpha1

Description: windows网络抓包源代码,是网络编程人员必不可少的源代码,相信对大家一定有用,现在传给大家-windows capturing Packet network source code, network programmers is essential to the source code, I believe we will certainly useful, we now pass
Platform: | Size: 589902 | Author: 赵新凯 | Hits:

[Internet-NetworkWpdPack_3_2_alpha1

Description: windows网络抓包源代码,是网络编程人员必不可少的源代码,相信对大家一定有用,现在传给大家-windows capturing Packet network source code, network programmers is essential to the source code, I believe we will certainly useful, we now pass
Platform: | Size: 589824 | Author: 赵新凯 | Hits:

[TCP/IP stackIPV6-UDPSend

Description: IPV6实现UDP报文发送小Demo,附tpipv6头文件,在vc6.0环境下通过测试。-IPV6 realize UDP packet sent small Demo, attached tpipv6 header files, in the circumstances vc6.0 to pass the test.
Platform: | Size: 40960 | Author: wuhongbing | Hits:

[Sniffer Package capturerawtcpip

Description: This code will send a raw tcpip packet without data using a dll just put rawtcpip.dll in windows\system32 and run this code. you need to pass 11 arguments. The dll is raw with out much error handling. I will try to include some error handling in it. Arguments to pass are all type string. Argument list is : Destination IP, Destination Port. Source IP,Source Port, TTL, Flags(URG,ACK,PSH,RST,SYN,FIN) it will return 0 in successfull packet transmission.-This code will send a raw tcpip packet without data using a dll just put rawtcpip.dll in windowssystem32 and run this code. You need to pass 11 arguments. The dll is raw with out much error handling. I will try to include some error handling in it. Arguments to pass are all type string. Argument list is: Destination IP, Destination Port. Source IP, Source Port, TTL, Flags (URG, ACK, PSH, RST, SYN, FIN) it will return 0 in successfull packet transmission.
Platform: | Size: 41984 | Author: xunion | Hits:

[Crack HackTIANJI

Description: 20090225sky登陆器反PASS验证封包-Landers 20090225sky anti-PASS authentication packet
Platform: | Size: 2048 | Author: w | Hits:

[J2MESuperMate

Description: J2ME手机版游戏——配对赛源代码,可以运行于S60手机,游戏本身和连连看有点类似,就是找出画面中两个相同的图片配对,配对正确后两个图片会消失,消失的越多等于接下来的游戏越容易过关。编译源代码需要相应手机包和资源文件,这里仅包含一些图片资源。 -J2ME mobile phone version of the game- matching game source code, can run on S60 mobile phone, games Lianliankan itself and is somewhat similar to that screen to find the same two picture pair, two pair right after the picture will disappear, the disappearance of many of the more Games equal the easier the next pass. Required to compile the source code and resources of the corresponding packet mobile document here contains only a number of picture resources.
Platform: | Size: 147456 | Author: 王恒阳 | Hits:

[Post-TeleCom sofeware systemscommu

Description: 这是一个自我感觉很好的通信程序,它的特点: 1.数据包格式全部自己定义。  所有的定义和通信核心类全部在COMM文件夹中。 2.能处理大量客户端同时通信的情况,客户和服务端共用相同的通信对象,并且可以实现互传。 -This is a feel-good communications program that features: 1. The data packet format all its own definition. The definition and communication of all the core classes all in the COMM folder. 2. Capable of handling a large number of simultaneous communication of the client, client and server share the same communication object, and each pass can be achieved.
Platform: | Size: 96256 | Author: liupfei | Hits:

[Otherplusrilinoise

Description: 基于小波包的带通滤波器设计程序。给出了小波变换的快速算法和重构算法,讨论了应用小波变换进行信号带通滤波的方法,并通过正交小波包对信号的分解,把频率成分复杂的信号分解到各个频带上,根据需要提取指定频率的信号,然后用小波包重构算法对信号进行重构,实现对信号的提取。-Based on wavelet packet band-pass filter design program. Given the fast algorithm of wavelet transform and reconstruction algorithms are discussed using wavelet transform signal band-pass filtering method, and through the wavelet packet to signals can be decomposed, 把 frequency components of complex signal is decomposed into various frequency bands 上, according to need to extract the specified frequency signal, and then reconstructs the signal reconstruction algorithm to achieve the extraction of the signal.
Platform: | Size: 1024 | Author: 王综新 | Hits:

[Sniffer Package capturefbljth

Description: 封包拦截自己修改的感觉还不错,新手第一次传东西-Modified packet interception own feeling pretty good, something new to pass the first time
Platform: | Size: 52224 | Author: wangbojun | Hits:

[Com PortcommFileSendRcv

Description: 两台计算机间用串口传输文件的例子,含发送端和接收端的源代码。 文件按包一个一个传输,每传个包等待对方应答后再继续传下一个包,传输稳定可靠。多次发大文件长时间测试未发现问题-Serial port between two computers, send files using the example of the sender and the receiver with the source code. File transfer according to package one by one, each pass and wait for a response before a packet to pass to the next packet, the transmission reliability. Send large files many times the test found no problems for a long time
Platform: | Size: 119808 | Author: Kim Huang | Hits:

[Internet-NetworkwinpcapDemo

Description: 利用Winpcap实现网络抓包程序 1.可以能过交换机旁路来实现网络抓包 2.实现了网络抓包的框架-Procedures for network packet capture using Winpcap 1. May be able to pass through the switch to implement network packet capture 2. To achieve a framework for network packet capture
Platform: | Size: 1254400 | Author: 郑茂军 | Hits:

[TCP/IP stackicmp

Description: ICMP就是所谓的Internet控制报文协议(Internet Control Message Protocol),在网络中,一般用它来传递差错报文以及其他应注意的信息。ICMP一般被认为是和IP协议同一层的协议,IMCP报文通常被IP层或者更高层的协议(如:TCP或者UDP)使用,ICMP对于互联网以及其他基于IP协议的网络的正常运行起着非常重要的作用。有许多重要的网络程序都是基于ICMP协议上的,最为著名如Ping和Tracert等。本文就来介绍用Visual C#实现基于ICMP协议重要的网络命令Ping的方法。 -ICMP is called the Internet control message protocol (Internet Control Message Protocol), in the network, generally using it to pass error messages and other information that should be noted. ICMP and IP generally considered to be the same layer of the protocol agreement, IMCP IP layer packet or, more often high-level protocols (such as: TCP or UDP) used, ICMP for the Internet and other IP protocol based on the normal operation of the network plays a very important role. There are many important web applications are based on the ICMP protocol, the most famous such as Ping and Tracert. In this paper, to introduce the use of Visual C# ICMP protocol-based network command Ping important ways.
Platform: | Size: 7168 | Author: 沈阳 | Hits:

[TCP/IP stackICMP

Description: ICMP就是所谓的Internet控制报文协议(Internet Control Message Protocol),在网络中,一般用它来传递差错报文以及其他应注意的信息。ICMP一般被认为是和IP协议同一层的协议,IMCP报文通常被IP层或者更高层的协议(如:TCP或者UDP)使用,ICMP对于互联网以及其他基于IP协议的网络的正常运行起着非常重要的作用。有许多重要的网络程序都是基于ICMP协议上的,最为著名如Ping和Tracert等。本文就来介绍用Visual C#实现基于ICMP协议重要的网络命令Ping的方法。 -ICMP is called the Internet control message protocol (Internet Control Message Protocol), in the network, generally using it to pass error messages and other information that should be noted. ICMP and IP generally considered to be the same layer of the protocol agreement, IMCP IP layer packet or, more often high-level protocols (such as: TCP or UDP) used, ICMP for the Internet and other IP protocol based on the normal operation of the network plays a very important role. There are many important web applications are based on the ICMP protocol, the most famous such as Ping and Tracert. In this paper, to introduce the use of Visual C# ICMP protocol-based network command Ping important ways.
Platform: | Size: 1024 | Author: 沈阳 | Hits:

[Special Effects7

Description: 图像平滑处理 高斯低通 小波 等多种算法集合包-Gaussian image smoothing algorithm and other low-pass set of wavelet packet
Platform: | Size: 117760 | Author: 曾春年 | Hits:

[TCP/IP stackUDP

Description: 在两台计算机间完成一个简单的UDP传输。 客户端 (1) 循环从命令行读入一行字符串,并传递给服务器,由服务器对字符串进行反转,并将结果返回给客户端 (2) 客户端显示反转后的字符串 (3) 当客户按下“delete”健后,关闭套接字,结束程序 服务器端 (1) 收到客户端数据包,首先验证数据包源地址是否合法 (2) 接收客户的数据,并显示客户的IP地址和端口号 (3) 接收客户传来的字符串,反转后传递给客户 -Between the two computers to complete a simple UDP transport. Client (1) loop reads a line from the command line string and passed to the server, from server to reverse the string and returns the results to the client (2) the client to display the string after the reverse (3 ) When the customer hits the " delete" health, close the socket, the end of the program server (1) the client receives the packet, first verify that the packet source address is valid (2) to receive customer data, and displays the customer' s IP address and port number (3) to receive a string of customers came, after the reverse pass to the customer
Platform: | Size: 1024 | Author: | Hits:

[Internet-NetworkDNS-resolution

Description: python源码,DNS解析方面的一部分功能代码,传一个包到DNS服务器,然后获取DNS服务器给你回传的地址,有多个地址也可以一起显示,里面的解释都很详细,应该能看明白。运行需要传2个参数(域名和DNS服务器IP地址)-python source code, DNS resolution in part of the function code, pass a packet to the DNS server, DNS server and then get to your return address, there are multiple addresses can also be displayed together, which are explained in detail, it should slow connection. Need to pass two parameters to run (domain name and DNS server IP address)
Platform: | Size: 6144 | Author: guo | Hits:

[OtherAODVSampath

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-UnixAODVkalai

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-Unixsskal

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[.netUDPDaDong

Description: UDP打洞测试程序,实现点对点信息传输,C#提供了Sockets来进行套接字的编程,里面包含了TcpClient和UdpClient。用过的大家都知道Tcp发送消息更安全,而Udp传送数据容易丢包,但速度快,能穿越防火墙。目前比较流行的QQ聊天工具底层传输协议用户的就是Udp协议(不知道现在该没)。-UDP hole punching test program, peer-to-peer information transmission, C# Sockets to socket programming, which contains TcpClient and the UdpClient. Used everyone know Tcp safer to send messages, and the the Udp transfer data easily packet loss, but fast, able to pass through the firewall. QQ chat tools underlying transport protocol users more popular is the the Udp agreement (do not know this did not).
Platform: | Size: 98304 | Author: 胡军华 | Hits:
« 12 »

CodeBus www.codebus.net