Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Windows Develop GUI Develop Other
Other list
Sort by :
« 1 2 ... .70 .71 .72 .73 .74 1675.76 .77 .78 .79 .80 ... 1760 »
Downloaded:0
smurf attack is very simple. It has some IP address list and can send pseudo ICMP echo request. As a result, broadcast storm will occur.
Update : 2008-10-13 Size : 3.79kb Publisher : 孙新

There is a serious leak during the process of the ip-pakege recombination of the Linux.This program can attack the Linux through the leak.
Update : 2008-10-13 Size : 3.59kb Publisher : 孙新

attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port launched with a link (the SYN), Win95 will collapse.
Update : 2008-10-13 Size : 1.63kb Publisher : 孙新

The code to clear the thread of inbreaking!
Update : 2008-10-13 Size : 929byte Publisher : 孙新

a small VF establishment of a small program on the database theory of curriculum design applications.
Update : 2008-10-13 Size : 2.42mb Publisher : 胡子

Downloaded:0
traditional encryption/decryption algorithm, it s practicality and conveniency for introducing swaping to process file
Update : 2008-10-13 Size : 362kb Publisher : 李户

Downloaded:0
This software can dispose images with Insar,its function is very powerful, it can be executed rightly only after it is built under cygwin .
Update : 2008-10-13 Size : 856.31kb Publisher : 成方

Downloaded:0
converse UNCODE to characters followed the criterion of UTF-8, and converse UTF-8 to characters followed the criterion of UNCODE.
Update : 2008-10-13 Size : 2.35kb Publisher : huntglede

network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Update : 2008-10-13 Size : 5.23mb Publisher : 李琨

Downloaded:0
based on Struts MVC forum system, using the Tomcat DB_ Connection Pool
Update : 2008-10-13 Size : 80.21kb Publisher : 黄佳

Downloaded:0
realization of the right touch-screen monitor, found Touchscreen lockups or after a system reboot automatically activated touch screens and loading procedures were activated.
Update : 2008-10-13 Size : 93.84kb Publisher : 飞翔的鸟

now information security has been the focus of attention, watermark technology in the Information Hiding is a new approach. This article can help us to understand watermarking technology.
Update : 2008-10-13 Size : 522.78kb Publisher : 王清华
« 1 2 ... .70 .71 .72 .73 .74 1675.76 .77 .78 .79 .80 ... 1760 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.