搜索资源列表
jywct
- UDP实现的NAT穿透 广域网穿透,有需要的下来研究一下-UDP NAT penetration achieved through wide area network, we need to look down
av_vel
- c语言编写的一个程序,用于计算平均流速用以修正防穿透速度。 -The average flow rate used to calculate the penetration rate for the modified anti-
stcslct
- 渗透测试流程图 渗透测试流程图-Penetration test flow chart
marketsystem
- 随着信息产业的出现和网络的普及,计算机的应用已普及到人类社会的每一个角落,它与人类的生活关系越来越密切。超市在我们的生活中充当了相当重要的角色,使超市的销售信息化自动化是当前超市系统所面临的一大难题。通过该系统软件,会使收银员更方便,更快捷的销售,从而提高工作效率.,使顾客更快捷地获得商品。内容齐全包括开发的所有文档-With the emergence of the information industry and network p
report_help
- ES2007报表帮助资料 ES2007:方正飞鸿智能信息平台 ES2007 业务平台基于SOA 架构体系,结合数据建模、业务建模、可视化流程引擎、 动态表单设计等多种实现工具,是企业应用开发的一个高效、强大、开放的开发工具。 其柔性的特点,保障了基于平台开发的系统可在.Net 平台与J2EE 平台上无缝的切换运 行。 ES2007 业务平台实现业务导向和驱动的软件开发,从根本上解决管理软件开发中 的诸多难题,
webshell-or-system-privileges
- mssql中public和db_owner权限下拿到webshell或者系统权限 - [入侵渗透] -mssql in the public and db_owner privileges or system privileges to get webshell- [intrusion penetration]
free_scale_nework_BA
- 基于Barabasi-Albert模型的建立无尺度网络生长模型。控制参数:平均出度m,结点数n。输出所有入度点数比例;输出直方图分段比例;输出集散节点-Based on Barabasi-Albert model of scale-free network growth model. Control parameters: the average out-degree m, the number of nodes n. Output r
fivechess
- C#4.0 点对点五子棋 一个文件包括了服务端和客户端,不支持内网穿透,-C# 4.0-point backgammon file includes server and client do not support the internal network penetration,
xinxiku
- 安全加固 渗透测试 等等一系列的学习资料!内容比较全面-Security penetration testing, and so a series of reinforcement learning materials! More comprehensive content
bt5_boot_new
- 是一个渗透测试的系统,类似于Linux,功能很强大,很实用,我也是刚刚装机的-Is a penetration test system, similar to Linux, very powerful, very practical, I have just installed the
dpslam0.1.1.tar
- 机器人地图创建新算法,DP-SLAM源程序-Abstract—Probabilistic approaches have proved very successful at addressing the basic problems of robot localization and mapping and they have shown great promise on the combined problem of si
joomscan-latest
- sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche feat
AppScan-pentest
- webappscan 渗透测试自动化教程-webappscan penetration test automation tutorial
NRF24L01111111
- 无线收发模块例程,NRF24L,具有良好的穿透力-Wireless transceiver module routines, NRF24L, with good penetration
nrf905KB-1B-1B-V3.42
- 无线收发模块,npf905,具有良好的穿透力,和远距离传输-Wireless transceiver module, npf905, with good penetration, and long-distance transmission
Network-penetration-Attack
- 黑客的基本攻击方法及原理,以及一些简单软件应用。 网络渗透攻击事件的发生极为普遍,众多的网络管理员和网络安全工作者却对网络安全环境所面临的严峻考验缺乏足够的认识,因而也未曾采取全面的防范补救措施应对各种攻击行为。《孙子兵法》曰“知已知彼,百战不殆;不知彼而知已,一胜一负;不知彼不知已,每战必败”。建立有效的防御体系的惟一障碍是知识的不足。不论你是一位信息安全技术的爱好者、一位IT专家或一名有经验的信息安全实践者,只要你想建立起
tcp-hole
- 自己实现的tcp nat穿透方式,较好的完成了tcpnat穿透功能-The realization of our own TCP NAT penetration, completed the tcpnat penetration function
cvFindStereoCorrespondence
- 使用OpenCV cvFindStereoCorrespondence函數,計算出立體視覺影像深度,給予立體視覺左右圖像,啟動程序,即可計算出立體視差圖。-Use opevCV cvFindStereoCorrespondence function to calculate the penetration depth of stereoscopic vision. About to give three-dimensional visu
penatration
- penetration in wind power
23_1400_sksalman_01
- With increased penetration of wind power into electrical grids, DFIG wind turbines are largely deployed due to their variable speed feature and hence influencing system dynamics. This paper presents simulation results