搜索资源列表
RSAttack
- RS攻击M程序,用于检测图像是否经过LSB密写-RS attack M procedures for detecting whether the image after LSB steganalysis
AttackAPI
- AttackAPI提供简单而直观的web可编程接口,用于发起各类基于Javascr ipt的客户或者服务器攻击。-AttackAPI provide a simple and intuitive web programmable interface, used to launch various types of customers based on Javascr ipt or server attack.
10517-080605-0303B01-27
- 通过介绍网络上几种常见的攻击方式(电子欺骗攻击、拒绝服务攻击、同步攻击、Web欺骗攻击、密码攻击、*程序攻击等),然后就这些攻击方式提出相应的防范措施,最后就个人防范网络攻击提出了一些相关的策略。本文从以上方面来阐述在网络给人们带来诸多好处的同时,也带来了一些不可避免的负面影响,本文主要是为了有效地防范网络攻击,维护自己的权益不受侵犯,就需要我们尽量了解网络攻击的各种原理和手段、网络中存在的各种漏洞,以便及时维护我们的系统。 关键
md5-attack
- 这是一个关于md5 collision的文档介绍,讲的比较好-md5 collision on the document, the better the stresses
wepdecrypt-0.8.tar
- About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepatta
syn-flood
- synflood 攻击代码。发送大量的数据包来使被攻击主机瘫痪。-synflood attack code. Send a large quantity of data packets to enable mainfr a me attack paralyzed.
11_watermark
- 介绍音频数字水印的制作,包括音频数字水印的嵌入、攻击、提取、检测-audio digital watermark on the production, including audio digital watermark embedded in the attack, extraction, detection
IPfgzrar
- IP反向追踪技术综述 拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它 们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。 关键词 DoS攻击 主动追踪 反应追踪-IP traceback Technology denial of service attacks (DoS) to governm
attack_wmk
- 在图像中加入水印,在提取水印时,需要知道原始的水印数据,并做了提取和攻击测试-Add watermark in image in the watermark extraction, the need to know the original watermark data and make the extraction and attack test
land
- ip land attack by msdos
shift
- 实现shift算法,进行精确的图像识别,可以抵抗各种旋转、平移、缩放等仿射变换的攻击-Realize shift algorithm, an accurate image recognition, you can resist all kinds of rotation, translation, scaling affine transformation attack
bufBomb
- 经典缓冲区溢出攻击代码,含有文档。《深入理解计算机系统》一书中提供的例子,我进行了分析和试验,并将试验的结果和心得记录在文档中。欢迎下载-Classic buffer overflow attack code, containing the document.
attack
- 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
dm_dct_fenkuai
- 在DCT域,利用8*8分块DM方法,嵌入隐藏信息。可设置量化步长、选择各种经典的攻击方式和控制攻击强弱。返回误码率和峰值信噪比。利用Matlab编写。-In the DCT domain, the use of 8* 8 block DM methods, embedding hidden information. Quantization step size can be set to choose a variety of clas
patchwork
- 利用patchwork方法,嵌入0-1水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control
STDM
- 利用STDM方法嵌入水印信息,可设置量化步长,选择各种经典的攻击方式,控制攻击强弱,返回误码率和峰值信噪比-Stdm method using embedded watermark information, to set the quantization step size, choose a variety of classic attacks, controlling the strength of the attack and r
gaosixulie_watermark
- 由高斯正态分布序列产生 ,经(7,4)汉明编码,得到水印信号。能抵抗压缩 滤波等攻击-Sequence generated by the Gaussian normal distribution, with (7,4) Hamming code, the watermark signal. Resistant to compression filtering attack
overflow
- (黑客丛书)溢出的艺术。 软件破解及攻击类-(Hackers Books) The Art of overflow. Software crack and attack type
ARPtest
- arp攻击工具,使用了sdk开发包,局域网用的-arp attack tools, the use of the sdk development kit, LAN used
DoS
- dos c语言代码,dos攻击代码,源ip伪装,多线程。经典dos攻击编程!-dos c language code, dos attack code, the source ip camouflage, multi-threaded. Classic programming dos attack!