资源列表
simulator-codered-100run
- used to simulate CodeRed v2 worm,result as scan traffic!-used to simulate Code v2 worm, the result as scan traffic!
verifidecoder_src
- 一个自动识别网站验证码的程序,是批量查询、登录和访问网站的基础-an automatic identification codes site authentication procedures, volume inquiries, login and visit the foundation Web site
Trans
- 反编译Java代码之后,里面的汉字会变成Unicode表示方式,比如\\u2943,本程序可以将Unicode转换成汉字。-anti-Java code compiler, they will become the Chinese character Unicode said, For example, \\ u2943 that the procedure can be converted into Unicode Chinese characters.
关于java安全的程序和文档2
- PasswordMaskingintheJavaProgramming Language关于java安全的程序和文档-PasswordMaskingintheJavaProgramming L java anguage on security procedures and documentation
Clientchat11
- 一个电子白板,文字交流、文件传输的客户端应用程序。-a Whiteboard, the exchange of text, file transfer client application procedures.
elipt210
- 用C语言实现的椭圆加密算法,可以UNIX平台下编译,也可以作小的改动在Windows下编译。-using the C language elliptical encryption algorithm can be compiled under Unix platform, can also make minor changes in Windows compiler.
crc校验码
- 这是一个依靠检验文件CRC校验码来判断文件是否已经被病毒修改过的c程序-This is a test paper on CRC document to determine whether the virus has been revised procedures for the c
MC081380
- RFID智能卡ISO/IEC14443源代码,基于RC500开发平台,适用于门禁,安全认证-RFID smart card slot source code, based on the RC500 development platform Access to the application, security certification
PC SC Sample
- 微软PC/SC编程,基于SCM得Reader.开发程序.符合ISO7816 ,操作系统Windows2-Microsoft PC / SC programming, Based on SCM in Reader. development process. with ISO7816, Windows 2000 operating system
运行以后把电脑里拨号密码都偷出来——程序代码
- 运行以后把电脑里拨号密码都偷出来,程序代码.-run later in the computer dial-up passwords are stolen, and code.
把图片移动到星号密码上密码的原形就看到啦
- 程序里有一个张图片.把图片移动到星号密码上,密码的原形就看到啦-procedures there are a photo. Photo moved to put an asterisk password, the password prototype see it when
Hash2131
- 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming