搜索资源列表
SW_Network Attack and Defence
- 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Syn-attack.c.tar
- SYN-attack,not descr iption
Invertibility-attack-against-watermarking-based-on
- Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料
Attack
- 这软件是为了攻击对方计算机的。 用这个软件可以给对方电脑系统添麻烦。-this software is to attack the enemy's computer. This software can be used to the other computer system trouble.
Sudden Attack Game Engine SourceCode
- Full c++ game engine sourcecode for sudden attack game.
NoPassword
- 一个用来攻击获取EMAIL密码的程序.程序使用多个线程同时以POP3协议连接服务器,在某个区间内穷举纯数字的密码.-used to attack an email password access procedures. Procedures for the use of multiple threads to connect to POP3 server, in a certain range exhaustive pure digit
Attack
- 这软件是为了攻击对方计算机的。 用这个软件可以给对方电脑系统添麻烦。-this software is to attack the enemy's computer. This software can be used to the other computer system trouble.
局域网扫描空密码主机和ftp共享资源
- 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the securi
flowover
- 对网络上主机开445端口进行攻击的源程序,此程序利用MS0539漏洞。-host on the network open port 445 attack source, the use of this procedure MS0539 loopholes.
SW_Network Attack and Defence
- 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
网络评估系统
- 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project thr
StirMark_3_1_79
- StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear/splicing att
attackofwatermarking
- 通过程序介绍的一些算法,可以对信息隐藏技术实施攻击,特别是水印技术.-procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.
tete
- 这是一个集多种网络黑客工具于一体的软件!能够比较方便的进行几种简单的网络攻击!在局域网内测试通过!-This is a multi-network hackers tools in the integrated software! Compared to facilitate the conduct of several simple network attack! The LAN test pass!
udpfloodAttack
- UDP洪水攻击程序源码.威力很大.不要拿它来作坏噢-UDP Flood attack procedure source. Powerful. Not bad for the staff to Oh
AttackToolKitv4.0
- 这是一款基于Microsoft Windows 框架使用的开源安全扫描工具,可以用来检测系统安全漏洞和增强安全审计,可以生成详细的html、text和Nessus nsr 结果和攻击分析报告,支持CVE names、SecurityFocus、CERT、Snort、Nessus NASL等。内附源代码。-It is a Microsoft Windows-based fr a mework for the use of open-sou
atackanddefeng
- 《攻击与防护网络安全与实用防护技术》源代码,一本好书-"attack and defense network security protection technology and practical" source code, a good book
Invertibility-attack-against-watermarking-based-on
- Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料-Invertibility attack against watermarking based on forged algorithm and a countermeasure, it is speaking of information
Cube-attack
- Cube 攻击的几篇文章,Cube Attack由Itai Dinur 和Adi Shamir于2008年提出。这种攻击并不是全新的,但是它把以前多种启发式攻击的技巧综合起来,仔细分析了攻击未知的、随机的主多项式成功的复杂度和成功概率。-Some papers of Cube attack,Cube attacks work well for random polynomials of small degree. Real-world
attack
- 随机蓄意攻击对比 攻击效果对比的图形 最后还有半数致死量(random attack and on purpesrandom attack and on purpesrandom attack and on purpes)