Description: Tribe FloodNet 2k
Distributed Denial Of Service Network
分布式拒绝服务工具的源代码,下面为英文说明:
TFN can be seen as the yet most functional DoS attack tool with the best
performance that is now almost impossible to detect. What is my point in
releasing this? Let me assure you it isn t to harm people or companies. It
is, however, to scare the heck out of everyone who does not care about
systematically securing his system, because tools sophisticated as this one
are out, currently being improved drastically, kept PRIVATE, and some of them
not with the somewhat predictable functionality of Denial Of Service. It is
time for everyone to wake up, and realize the worst scenario that could happen
to him if he does not care enough about security issues.
Therefore, this program is also designed to compile on a maximum number of
various operating systems, to show that almost no modern operating system is
specifically secure, including Windows, Solaris, most UNIX flavors and Linux.
-Tribe FloodNet 2k Distributed Denial Of Se rvice Network Distributed denial of service tools source code for the English below : TFN can be seen as the most functional yet DoS att Ack tool with the best performance that is now al most impossible to detect. What is my point in re this leasing Let me assure you it isn t to harm peo ple or companies. It is, however, to scare the heck out of everyone who does not car e about systematically securing his system, because tools sophisticated as this one are out , currently being improved drastically. PRIVATE kept, and some of them not with the somewhat predictab le functionality of Denial Of Service. It is tim e for everyone to wake up. and realize the worst scenario that could Happe n to him if he does not care enough about security issues. There Platform: |
Size: 44662 |
Author:onlyu |
Hits:
Description: Tribe FloodNet 2k
Distributed Denial Of Service Network
分布式拒绝服务工具的源代码,下面为英文说明:
TFN can be seen as the yet most functional DoS attack tool with the best
performance that is now almost impossible to detect. What is my point in
releasing this? Let me assure you it isn t to harm people or companies. It
is, however, to scare the heck out of everyone who does not care about
systematically securing his system, because tools sophisticated as this one
are out, currently being improved drastically, kept PRIVATE, and some of them
not with the somewhat predictable functionality of Denial Of Service. It is
time for everyone to wake up, and realize the worst scenario that could happen
to him if he does not care enough about security issues.
Therefore, this program is also designed to compile on a maximum number of
various operating systems, to show that almost no modern operating system is
specifically secure, including Windows, Solaris, most UNIX flavors and Linux.
-Tribe FloodNet 2k Distributed Denial Of Se rvice Network Distributed denial of service tools source code for the English below : TFN can be seen as the most functional yet DoS att Ack tool with the best performance that is now al most impossible to detect. What is my point in re this leasing Let me assure you it isn t to harm peo ple or companies. It is, however, to scare the heck out of everyone who does not car e about systematically securing his system, because tools sophisticated as this one are out , currently being improved drastically. PRIVATE kept, and some of them not with the somewhat predictab le functionality of Denial Of Service. It is tim e for everyone to wake up. and realize the worst scenario that could Happe n to him if he does not care enough about security issues. There Platform: |
Size: 44032 |
Author:onlyu |
Hits:
Description: Hello guys,
I ve built this GSM security system as my semester project using T290i mobile and controlled my car using it. Please leave your comments about it.
If any one needs help in implementing such a system, I can help.
Some of the functions it can perform are:
* start and stop the engine (without using the key)
* stop the engine if somebody starts it with a key ( by cutting off ignition)
* lock and unlock the doors
* send a text message to the owner if an intruder is detected (by monitoring the doors)
* switch the heater/air conditioner on and off
Platform: |
Size: 1984512 |
Author:Asif |
Hits:
Description: 介绍了现在汽车防盗系统的功能以及根据未来发展防盗系统的前进与方向-Car anti-theft system is now described the function and future development of security systems in accordance with the direction of forward Platform: |
Size: 193536 |
Author:王恒 |
Hits:
Description: In this project, we are going to develop an intelligent video surveillance system for a car park. The system monitors the client’s car park 24 hours and 7 days a week. In order to reduce the workload of the security officers, we need to develop an algorithm that is able to detect and extract any moving humans and vehicles. Each type of the extracted moving objects should be outlined using smallest possible bounding-boxes that enclose the moving objects. All humans are to be outlined in red bounding-boxes and cars are in blue bounding-boxes Platform: |
Size: 2597888 |
Author:李台 |
Hits:
Description: 本系统利用传
呼台的网络优势达到远程控制的目的, 且具备汽车报警系统现有的其他功能, 是
一种性能稳定, 安全性和性价比较高的产品, 可广泛应用于各个地区, 各种汽车
系统.-The system uses the paging network edge to achieve the purpose of remote control and car alarm systems with other existing features, is a stable performance, high security and cost-effective products, can be widely applied in various regions, various automotive system. Platform: |
Size: 129024 |
Author:李洋 |
Hits:
Description: bascom-avr移动安全系统项目: 该项目采用电话拨号系统的设计。是。在这个系统中,同样的方法移动Aptvkvplr键3用于连接到微。拨号可以做到的。然后Bazr设备以声音报警和对手。人们也可以听到的声音,然后挂断电话,结束关系。该系统可用于提供额外的乐趣。例如,如果使用的是水分而不是米的锅,然后将您的手机号码的安全传感器“锅在院子里我!”移动中午在液晶显示屏上,这表明,锅需要水的院子里!为下议院思想是了不起的事情,感受生活和智能化的脸。另外这种方法的另一个有趣的应用程序中使用LM35温度传感器或微型SMT160输入和设置拨号的温度低于摄氏1度。-AVR Cell phone Security system Project:
This is a mobile security system based on GSM cell phone network. you can use this system for home or car security. when the sensor of this project send a signal, the cell phone call your number. Platform: |
Size: 113664 |
Author:lupo |
Hits:
Description: The use of fingerprints for identification has been
employed in law enforcement for about a century. A much
broader application of fingerprints is for personal
authentication, for instance to access a computer, a network, a
bank-machine, a car, or a home. The topic of this chapter is
fingerprint verification, where "verification" implies a user
matching a fingerprint against a single fingerprint associated
with the identity that the user claims. The following topics are
covered: history, image processing methods, enrollment and
verification procedures, system security considerations,
recognition rate statistics, fingerprint capture devices,
combination with other biometrics, and the future of fingerprint
verification. Platform: |
Size: 323584 |
Author:swetha |
Hits:
Description: The use of fingerprints for identification has been
employed in law enforcement for about a century. A much
broader application of fingerprints is for personal
authentication, for instance to access a computer, a network, a
bank-machine, a car, or a home. The topic of this chapter is
fingerprint verification, where "verification" implies a user
matching a fingerprint against a single fingerprint associated
with the identity that the user claims. The following topics are
covered: history, image processing methods, enrollment and
verification procedures, system security considerations,
recognition rate statistics, fingerprint capture devices,
combination with other biometrics, and the future of fingerprint
verification. Platform: |
Size: 148480 |
Author:swetha |
Hits:
Description: The use of fingerprints for identification has been
employed in law enforcement for about a century. A much
broader application of fingerprints is for personal
authentication, for instance to access a computer, a network, a
bank-machine, a car, or a home. The topic of this chapter is
fingerprint verification, where "verification" implies a user
matching a fingerprint against a single fingerprint associated
with the identity that the user claims. The following topics are
covered: history, image processing methods, enrollment and
verification procedures, system security considerations,
recognition rate statistics, fingerprint capture devices,
combination with other biometrics, and the future of fingerprint
verification. Platform: |
Size: 358400 |
Author:swetha |
Hits:
Description: 面向中小型旅游企业一体化管理旅游系统,无论在稳定性、代码优化、运行效率、负载能力、安全等级、功能可操控性和权限严密性等方面都居国内外同类产品领先地位。帮助中小型旅游企业实现管理,应用了新一代的B/S结构,巧妙地结合了酒店、机票、线路、景区、会员,租车等多种功能于一体,它以浏览器为软件界面的导航式操作,快速完成日常管理中的会员,订单等操作,并结合准确、高效的统计和业务分析功能,通过交互式的数据中心与一目了然的统计,使企业决策者最关心的往来订单、会员状况等能够即点即现-For small and medium tourism enterprise integration management system of tourism, in terms of stability, code optimization, operational efficiency, load capacity, security, and access control features in such aspects as rigor in the domestic and foreign similar products leading position. To help small and medium tourism enterprises management, application of new generation B/S structure, cleverly combines the hotel, air tickets, line, area, membership, car rental and other functions in one, it in the web browser software interface navigation operation, rapid completion of the daily management of the membership, orders and other operations, and combined with accurate, efficient statistical and business analysis function, through interactive data center and stick out a mile statistics, make enterprise policymaker cares most current order, membership status can point at
Platform: |
Size: 1523712 |
Author:ss |
Hits:
Description: 本文首先介绍了网上购物系统的现状及开发背景,然后论述了系统的设计目标,系统需求和总体设计方案,较详细的论述了系统的详细设计和实现。最后,本文对网 上购物系统进行了系统检测并提出了还需要改进的问题。
本系统主要为用户提供了会员注册,购物车管理,用户资料修改等功能,为管理员提供了商品管理,用户信息管理等功能。在设计方面,本系统采用B/S三层结构,同时使用JSP技术进行动态页面的设计,从系统的安全性和代码的可重用性方面考虑,运用JavaBean对程序的关键代码进行封装。后台数据库选用My SQL数据库。-The system has mainly provided users with the following functions: membership registration、shopping car management、goods search、information modify etc. It has also provided managers with goods management、customer information management、news management 、ad management and so on. It has been designed with B/S mode of three-tier structure, JSP technology in dynamic page design. Considering from the security and reusing code of the system, key codes has been secured by JavaBean technology. My SQL database has been used as the background database. Platform: |
Size: 7373824 |
Author:秦坤 |
Hits:
Description: 面向中小型旅游企业一体化管理旅游系统,无论在稳定性、代码优化、运行效率、负载能力、安全等级、功能可操控性和权限严密性等方面都居国内外同类产品领先地位。帮助中小型旅游企业实现管理,应用了新一代的B/S结构,巧妙地结合了酒店、机票、线路、景区、会员,租车等多种功能于一体,它以浏览器为软件界面的导航式操作,快速完成日常管理中的会员,订单等操作,并结合准确、高效的统计和业务分析功能,通过交互式的数据中心与一目了然的统计,使企业决策者最关心的往来订单、会员状况等能够即点即现。乐旅旅游网站系统为全开放源码版本,永久使用,终身免费。-For the integrated management of small and medium-sized tourism enterprises tourism system, similar products home and abroad leading position in terms of stability, code optimization, operating efficiency, load capacity, security level, the handling and strict authority. To help small and medium-sized tourism enterprises management, the application of a new generation of B/S structure, cleverly combined with hotels, flights, routes, scenic, Member, car rental and other functions in one, as the software interface to the browser navigation style operation and rapid completion of the operation of the day-to-day management of the Member orders, combined with accurate and efficient statistical and business analysis, business decision-makers are most concerned about both orders, Member situation through interactive data center at a glance statistics to that point that now. Music about travel site for full open source version for permanent use, free for life. Platform: |
Size: 1588224 |
Author:王鸿 |
Hits:
Description: 本系统的主要功能为:
(1)线路信息及查询:包括出发地、目的地、出发时间、所需时间等;
(2)汽车信息及查询:包括汽车的种类及相应的票价、最大载客量等;
(3)售票信息及查询:包括售票情况的查询及打印等。
(4)系统要实现满足多种条件的统计分析功能,有些统计数据要采用图表的格式呈现;
(5)系统要有一定的安全控制策略;
(6)系统要采用实际数据进行测试。
-The main function of the system: (1) line information and inquiries: including the departure point, destination, departure time, and the time required (2) automotive information and inquiries: including the type of car and the fare, the maximum set out in passenger volume, etc. (3) Ticket information and inquiries: including ticket sales inquiries and print. (4) system to achieve the statistical analysis capabilities to meet a variety of conditions, some statistics chart format presentation (5) the system to have a certain security control strategy (6) system to the actual data test. Platform: |
Size: 442368 |
Author:weihuiyi |
Hits:
Description: 可以有效监控车辆现在的位置以及曾经去过的地方,对于车辆以及车上物品的管理有着重要的意义. 广泛适用于各种企业以及事业单位的车辆管理.例如公安车辆调度,物流公司,汽车租赁,私家车的追踪管理等等。-Can effectively monitor the current position of the vehicle and where I have been, for goods vehicles and vehicle management has an important significance. Widely used in a variety of corporate and business unit management vehicles such as public security vehicle scheduling, logistics companies, car rental , private car tracking management. Platform: |
Size: 980992 |
Author:霍新伟 |
Hits:
Description: 新能源汽车远程监控系统具有实时监控车辆的电池信息,电机控制器信息,整车信息车辆运行状态信息、故障信息、电池信息等的显示、查询和存储功能,用户能够实时掌握电动车辆的运行情况,使人、车、路三者紧密协调,为车辆的运营、维护提供快速的安全保障。
系统由两部分组成,一是车载信息终端;二是云端信息服务平台。通过车载信息终端和云端信息服务平台实现对电动车辆的远程监控、故障诊断和信息服务。用户可通过浏览器登陆远程综合信息服务平台,对电动车辆进行管理,同时可获取相应的服务信息。
平台介绍地址
http://web.iPowerCloud.cn
-The remote monitoring system of new energy vehicle with real-time monitoring of vehicle battery information, motor controller information, vehicle information of vehicle running status information, fault information, battery information display, query and storage function, the user can run real-time grasping of an electric vehicle, make people, car, road three in close coordination, provide security fast in order to maintain vehicle operation.
The system is composed of two parts, one is the vehicle information terminal two is the cloud information service platform. Through the implementation of the electric vehicle remote monitoring, fault diagnosis and information service vehicle information terminal and information in the cloud service platform. The user can login remote integrated information service platform through the browser, for the management of electric vehicles, and can obtain the corresponding service information.
Platform is introduced.
Http://web.iPowerCloud.cn Platform: |
Size: 2169856 |
Author:刘欣 |
Hits: