Location:
Search - Attack
Search list
Description: 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Platform: |
Size: 5488344 |
Author: 李琨 |
Hits:
Description: 这篇介绍了internet攻击的相关知识。大家喜欢我就再上传。-This attack on the internet and the related knowledge. I would like to re-upload.
Platform: |
Size: 431531 |
Author: Joe Zhao |
Hits:
Description: SYN-attack,not description
Platform: |
Size: 1539 |
Author: singyea |
Hits:
Description: Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料
Platform: |
Size: 264588 |
Author: 101 |
Hits:
Description: 这软件是为了攻击对方计算机的。 用这个软件可以给对方电脑系统添麻烦。-this software is to attack the enemy's computer. This software can be used to the other computer system trouble.
Platform: |
Size: 74498 |
Author: 崔林 |
Hits:
Description: Full c++ game engine sourcecode for sudden attack game.
Platform: |
Size: 49783806 |
Author: g0rdon |
Hits:
Description: 一个用来攻击获取EMAIL密码的程序.程序使用多个线程同时以POP3协议连接服务器,在某个区间内穷举纯数字的密码.-used to attack an email password access procedures. Procedures for the use of multiple threads to connect to POP3 server, in a certain range exhaustive pure digital passwords.
Platform: |
Size: 73728 |
Author: 梁我我 |
Hits:
Description: 这软件是为了攻击对方计算机的。 用这个软件可以给对方电脑系统添麻烦。-this software is to attack the enemy's computer. This software can be used to the other computer system trouble.
Platform: |
Size: 73728 |
Author: 崔林 |
Hits:
Description: 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: |
Size: 552960 |
Author: 石林 |
Hits:
Description: 对网络上主机开445端口进行攻击的源程序,此程序利用MS0539漏洞。-host on the network open port 445 attack source, the use of this procedure MS0539 loopholes.
Platform: |
Size: 1031168 |
Author: windy_duy |
Hits:
Description: 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Platform: |
Size: 5487616 |
Author: 李琨 |
Hits:
Description: 超级DDOS (分布式拒绝服务攻击)源码 ,每秒大于40000次-Super DDOS (Distributed Denial of Service Attack) source, more than 40,000 times per second
Platform: |
Size: 5120 |
Author: ship |
Hits:
Description: 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技
术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,
去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同
时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安
全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: |
Size: 1773568 |
Author: 大大 |
Hits:
Description: 目前的DDOS拒绝服务攻击大多都是SYN攻击,在这里给大家syn攻击的源码。-current DDOS denial of service attacks, most SYN attack, here we syn attack to the source.
Platform: |
Size: 11264 |
Author: 飞机抗敌 |
Hits:
Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear/splicing attacks, such as synchronization.
Platform: |
Size: 1007616 |
Author: 杨琴 |
Hits:
Description: 通过程序介绍的一些算法,可以对信息隐藏技术实施攻击,特别是水印技术.-procedures introduced by the algorithm, the information can be hidden to attack technology, in particular watermarking technology.
Platform: |
Size: 3072 |
Author: 侯开浩 |
Hits:
Description: 这篇介绍了internet攻击的相关知识。大家喜欢我就再上传。-This attack on the internet and the related knowledge. I would like to re-upload.
Platform: |
Size: 431104 |
Author: Joe Zhao |
Hits:
Description: Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料-Invertibility attack against watermarking based on forged algorithm and a countermeasure, it is speaking of information digital watermarking attacks
Platform: |
Size: 264192 |
Author: 101 |
Hits:
Description: Cube 攻击的几篇文章,Cube Attack由Itai Dinur 和Adi Shamir于2008年提出。这种攻击并不是全新的,但是它把以前多种启发式攻击的技巧综合起来,仔细分析了攻击未知的、随机的主多项式成功的复杂度和成功概率。-Some papers of Cube attack,Cube attacks work well for random polynomials of small degree. Real-world ciphers, when viewed as polynomials, don t have small degree. Every real-world cipher has about half of the possible monomials of degree 0, about half of the possible monomials of degree 1, about half of the possible monomials of degree 2, about half of the possible monomials of degree 3, ..., about half of the possible monomials of degree 30, about half of the possible monomials of degree 31, about half of the possible monomials of degree 32, ..., about half of the possible monomials of degree 40, ..., about half of the possible monomials of degree 50, etc., continuing far beyond the degrees that cube attacks could possibly reach.
Platform: |
Size: 735232 |
Author: Yongjuan Wang |
Hits:
Description: 随机蓄意攻击对比 攻击效果对比的图形 最后还有半数致死量(random attack and on purpesrandom attack and on purpesrandom attack and on purpes)
Platform: |
Size: 8192 |
Author: 了不起的sb |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»