Location:
Search - Prevention
Search list
Description: PID calculations for the _pid structure *a. This function uses the positional form of the pid equation, and incorporates an integral windup prevention algorithim. Rectangular integration is used, so this function must be repeated on a consistent time basis for accurate control.
Platform: |
Size: 1958 |
Author: 任 |
Hits:
Description: 本代码演示了缓冲区溢出的攻击与防范。
-demonstration of the code of buffer overflow attacks and Prevention.
Platform: |
Size: 14242 |
Author: 王挺 |
Hits:
Description: 本代码演示了缓冲区溢出的攻击与防范。我的开发环境
操作系统:windows xp professional + sp1a
编译器:visual c++.net 2003
由于操作系统的补丁太多,即使与我相同的系统也可能需要修改LoadLibrary、GetProcAddress、VirtualAlloc和\"jmp esp\"指令的地址。
请谨慎修改编译参数,修改参数可能导致修改程序。
请只编译release版,debug版无法正常执行。-demonstration of the code of buffer overflow attacks and Prevention. I development environment operating system : Windows XP Service Pack 1a Express Install professional compiler : visual c. Net 2003 operating system patches too much, even with the same system, I may need to revise LoadLibrary, GetProcAddress, VirtualAlloc and "JMP esp" instruction address. Please carefully revised compiler parameters, parameter changes could lead to the revision process. Please only compiler release version, debug version of the normal implementation.
Platform: |
Size: 14323 |
Author: gogo |
Hits:
Description: 另一个内存泄露的防治方法,适用于嵌入式系统-memory leakage prevention methods applicable to embedded systems
Platform: |
Size: 32396 |
Author: 里我 |
Hits:
Description: 将Surfer7.0与Mapinfo两个软件配合绘制降雨量等值线,解决了计算绘图在高、低值区丢失等值线和已知点外部曲线走向不合理问题,绘出的等值线与人工勾绘等值线比较无明显差异,能够满足防汛要求。-Will be two Surfer7.0 with Mapinfo mapping software rainfall isogram solved computing graphics in high-and low-value areas isogram lost and known point to rectify the anomalies in the external curve, the contour map and artificial hook painted isogram no significant difference, to meet flood prevention requirements.
Platform: |
Size: 3072 |
Author: name1 |
Hits:
Description: 该工具用Delphi7写的,可帮助我们生成一些插入语句。
例如:
现要向一台机(P2)的数据库(以HR为例)插入另一台机(P1)的HR_New_Info记录,可如下操作:
1.输入P1的IP,用户名,密码。数据库输入“HR”
2.在查询语句输入
select Title,Content,TypeName,Flag,DateAndTime from HR_New_Info
3.在插入语句输入
insert into HR_New_Info(Title,Content,TypeName,Flag,DateAndTime)
4.点击生成语句,可生成如下语句:
insert into HR_New_Info(Title,Content,TypeName,Flag,DateAndTime) values( 政府招聘网上报名系统投入使用 , , 新闻资信 ,True, 2008-9-30 )
insert into HR_New_Info(Title,Content,TypeName,Flag,DateAndTime) values( 防洪防汛工作顺利完成 , , 新闻资信 ,True, 2008-9-15 )
注,语句暂时只能保存为.sql文件
-Delphi7 written with the tool can help us generate some insert statement. For example: one is to drive (P2) of the database (to HR for example) into another machine (P1) of HR_New_Info records, may be as follows: 1. Enter the P1 s IP, user name, password. Database enter HR 2. In the query input select Title, Content, TypeName, Flag, DateAndTime from HR_New_Info3. In the insert statement enter insert into HR_New_Info (Title, Content, TypeName, Flag, DateAndTime) 4. Clicks generated statement can be generated the following statement: insert into HR_New_Info (Title, Content, TypeName, Flag, DateAndTime) values (the Government for recruiting online registration system put into use, the press information, True, 2008-9-30) insert into HR_New_Info (Title, Content, TypeName, Flag , DateAndTime) values (the successful completion of flood prevention work in flood prevention, credit information, True, 2008-9-15) note, the statement can only be preserved for the time being. sql file
Platform: |
Size: 1635328 |
Author: 何宝宝 |
Hits:
Description: 该文件详细介绍了snort的用法,snort是一个很好用的入侵检测系统。snort有三种工作模式:嗅探器、数据包记录器、网络入侵检测系统。-The open source Snort Intrusion Detection and Prevention system is the most flexible and widely deployed solution available
Platform: |
Size: 28672 |
Author: 邓平 |
Hits:
Description: 基于图像识别算法的森林防火系统设计
传统的森林火灾监测技术包括人工护林监测、飞机航测、卫星监测等。本文提出一种基于普通CCD 摄像头和瞭望塔上现有
的短波无线通信设备的森林防火监测系统, 根据实时图像与参考图像的差分及小波分解结果, 当有异常情况发生时, 提取出火焰及
烟雾区域, 判断提取区域是否具有烟雾和火焰的动态特征。若判定发生火灾, 即将压缩后的图像通过短波通信设备传回指挥中心。-Image recognition algorithm based on forest fire prevention system designed to monitor forest fires, traditional technologies such as artificial forest monitoring, aircraft and aerial survey, satellite monitoring. This paper presents a general CCD-based camera and observation tower on the existing short-wave wireless communications equipment, forest fire monitoring system, based on real-time image and reference image and the wavelet decomposition of the difference a result, when there are unusual circumstances arise, to extract the flame and smoke region, to determine whether the extraction of regional dynamics of smoke and flame characteristics. Determine if the fire broke out soon after the image compression short-wave communications equipment through the center return.
Platform: |
Size: 206848 |
Author: Jack |
Hits:
Description: 一份主动防御的源代码,希望对大家有用,谢谢!-source code about proactive prevention,i hope it may be help you.
Platform: |
Size: 616448 |
Author: 张鸣 |
Hits:
Description: 基于脚本的千兆位入侵防御开放模型研究Script-based Gigabit Intrusion Prevention Model of Open-Script-based Gigabit Intrusion Prevention Model of Open
Platform: |
Size: 247808 |
Author: tec1234 |
Hits:
Description: ITS IDEA FOR Aeronautical Crash Prevention System Through RF Communication TECHNOLOGIES
Platform: |
Size: 74752 |
Author: naga |
Hits:
Description: 本文综合了IDS与IPS的特点,将协议分析、网络流量分析与深度包检测技术相结合,提出一个新的网络防御系统一“基于协议分析的网络分布式入侵防御系统(Network Distributed Intrusion Prevention System Base on the Protocol
Analysis,NDIPS),同时给出了系统的基本实现,并利用现有仿真条件及网络基
础对部分检测防御技术进行了必要的评测与验证。该系统提高了网络对入侵的实
时阻止能力,提高了网络整体的安全性。-This combination of IDS and IPS features, the protocol analysis, network traffic analysis and deep packet inspection technology, to propose a new network defense system a " protocol analysis of network-based distributed intrusion prevention system (Network Distributed Intrusion Prevention System Base on the Protocol Analysis, NDIPS), also gives a basic implementation of the system and the simulation conditions and the use of existing network infrastructure technology for detection and prevention on the part of the necessary evaluation and verification. The system is to improve the network in real time to prevent the invasion ability of and improve overall network security.
Platform: |
Size: 4255744 |
Author: sdjgkj |
Hits:
Description:
Error Prevention , Minimalistic Design SSD4
by Malkhaz Avdalyan
Platform: |
Size: 608256 |
Author: geek7c8 |
Hits:
Description: Error Prevention , Minimalistic Design SSD4
Platform: |
Size: 611328 |
Author: geek7c8 |
Hits:
Description: prevention procedure in network sharing and bootstrapping nodal with the structure of SBK and improved version - proposed an improved version to speed up the bootstrapping procedure. Improved version retains all the nice features of SBK. SBK and Improved version are truly in situ schemes for bootstrapping keys in sensor networks that place no special requirement on regular sensors.-prevention procedure in network sharing and bootstrapping nodal with the structure of SBK and improved version - proposed an improved version to speed up the bootstrapping procedure. Improved version retains all the nice features of SBK. SBK and Improved version are truly in situ schemes for bootstrapping keys in sensor networks that place no special requirement on regular sensors.
Platform: |
Size: 198656 |
Author: venkat |
Hits:
Description: Early Detection and Prevention of Denial-of-Service
Platform: |
Size: 668672 |
Author: raj |
Hits:
Description: cheating prevention for multiple applications using matlab in image processing
Platform: |
Size: 221184 |
Author: manikandan |
Hits:
Description: this code show the warm hole attack prevention in ns2-this code show the warm hole attack prevention in ns2
Platform: |
Size: 5332992 |
Author: kanta kaliramana |
Hits:
Description: AIR POLLUTION PREVENTION DOCS
Platform: |
Size: 14336 |
Author: Pravat |
Hits:
Description: Atmel MCU 在PCB设计上防止EMI的方法-atmel mpu EMI prevention in pcb design application note
Platform: |
Size: 348160 |
Author: wells zhu |
Hits:
« 12
3
4
5
6
7
8
9
10
...
20
»