搜索资源列表
w123zh
- 很强大的一个网站攻击器,于11月18日作者放弃此程序放出源码,目前程序的版本是4.5版本. 这程序是w123zh制作的一个黑客工具,攻击方面也不错,希望大家可以继续发展此程序-Very powerful device attack on a website on November 18 by release source code to give up this program, the current program version is version 4.5. W123zh This
sendarp
- ARP attack on Linux enviroment
queens
- 一个使用greedy search算法实现的N个queen排列的程序。用星号代表国际象棋中的queen。随机生成布局后,显示每次移动,最后使queen不能互相攻击。即都不在相同的行,列和对角线。-A greedy search algorithm using the N-a queen arranged procedure. Behalf of the international chess with an asterisk in the queen. Randomly generated la
hacker
- 黑客攻防入门书籍 很好很强大 讲了各种攻击方法-Getting Started with a very good offensive and defensive hacking books, talk about a variety of very strong attack methods
Defines
- 机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions
GeometryR
- 机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Globe
- 机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Strategy
- 机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
Strategyc
- 机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
StrategySystem
- 机器人足球决策,能防守,进攻,等功能,参加国家大赛的-Robot soccer decision-making, can defend, attack, and other functions, participate in national contest
TArpAttack
- 局域网扫描/嗅探/反嗅探/欺骗/攻击程序 开发工具: Visual C++ 基于winpcap的网络扫描攻击程序,本程序通过ARP协议来实现各种功能,大部分网络攻击程序皆是采用此种方法.-LAN scan/sniff/anti-sniffer/cheat/exploit development tools: Visual C++ based on winpcap network scan attack program, this program through the AR
malicious.tar
- Malicious Cryptography. Excellent book on how to write cryptographic virii to attack systems. Malicious uses of cryptography.
queen
- n个皇后问题 在 n 行 n 列的国际象棋棋盘上,最多可布n个皇后。若两个皇后位于同一行、同一列、同一对角线上,则称为它们为互相攻击。 n皇后问题是指找到这 n 个皇后的互不攻击的布局。-n-Queens problem in n rows n columns of the chess board, up to n-Queens cloth. If the two Queens in the same row, same column, the same diagonal, then c
Gobang
- 由于五子棋比一字棋难,规则多,又有禁手限制,无法采用简单的搜索和加分方式。 为了分清各种情况的轻重缓急,我们采用一次性打分的策略: 对棋盘上的每个空位根据情况的轻重缓急,越重越争分越高,反之越低,然后根据打分找出分值最高的的位置下子。 打分事实根据有:是否赢棋(最高),对方是否要赢棋,是否禁手,可形成四连的个数,和形成三连(包括活三)的个数,对方可可形成四连的个数,和形成三连(包括活三)的个数,等等。 本算法的好处在于,既有攻又有守,而且攻守较严。-Gobang diffi
SpoofArp
- 对局域网的主机进行ARP的攻击,使其主机瘫痪,主要让初级同学实验.-Hosts on the LAN ARP attack to the host paralysis, mainly for primary students to experiment.
TCPIP
- T C P / I P (通常它是指传输控制协议/网际协议, Transmission Control Protocol/Internet Protocol)是发展至今最成功的通信协议,它被用于当今所构筑的最大的开放式网络系统I n t e r n e t之上就是其成功的明证。I n t e r n e t最初的设计是为了满足美国国防的需要,具体来讲就是使美国政府即使在遭受核打击时也能保证通信不间断, T C P / I P就是用于这个目的的。今天,I n t e r n e t已经发展得更加商
BiologicalRobot
- This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight a
c1
- c实现的缓冲区溢出攻击 介绍了如何用c语言实现缓冲区攻击-c realization of buffer overflow attacks describes how to use c language to achieve a buffer attack
ARP
- apr局域网攻击 适合SOKET初学者学习-arp attack
2
- RFID系统的IEEE的文章,安全协议,认证- In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol w