搜索资源列表
JavaRPGgdcs
- 这是Java版RPG游戏:古代传说的开源源代码,主要内容索引: E2字体放置14个,手机模拟器用18个为满 适合手机顽童的字体 Java播放动画 攻击选择(游戏主线程switch选择) 游戏战斗选择如状态、游戏魔法选择 怪物攻击时不能显示和死亡不能显示 进入攻击对象选择时按确定时进行菜单判断将无效 背景音乐的调用 游戏地图的加载应用等-This is the Java version of RPG game
mima
- 密码学,黑客攻防等等,适合信息安全专业同学学习-Cryptography, hacker attack and defense, etc., for students studying information security professional
x3blog_sgl-1.0.build80802-src
- X3-BLOG完美的利用了浏览器的XML解析技术,完全实现数据和界面的分离,使网络传输数据量大大减少,加载速度远远超过了市面上所有的BLOG产 品,有效的减轻了服务器的带宽压力,服务器端使用四大动态网站开发语言中速度最快的ASP.NET(C#)编写,屏弃了传统的控件开发方式,所有执行过程 采用单向流的生成方式,使其对服务器CPU及内存资源的占用降至最低水平,并通过gzip压缩进一步缩减服务器的网络带宽消耗,提高响应速度 。 无Session设计杜绝了用户会话无故丢失的尴尬,客户端关联的会话加
RangeAttack
- 范围攻击!适合在游戏开发中应用,很不错!-Range attack! Suitable for applications in game development is very good!
crapto1-v3.2.tar
- Crapto1 sources for attack mifar-Crapto1 sources for attack mifaree
DNFxiaoxin
- 小新DNF辅助,第九章,包括最新的天雷,人物飞天,倍攻,秒怪,不掉线,不封号!-DNF small new auxiliary, IX, including the latest tenrai, people flying, double attack, second strange, not dropped, no title!
macof
- macof arp flooping , attack the switch CAM table , then the switch will flood the traffic every port on that broadcast domain.-it s a tool that send random "mac address,like gratis" to DoS the CAM table.
all_attack
- 针对数字图片的各种攻击方法,使用Matlab编写。-Digital images for a variety of attack methods, the use of Matlab to write.
BEA_External_Why_TIBCO
- BEA Attack Kit Why TIBCO? Why Customers Choose TIBCO over BEA Top Business Reasons Top Technical Reasons
network_security(new)
- 介绍网络安全的理论体系,包含了很多方面,像Qos攻击,防火墙,入侵检测技术,网络侦查技术等等17章节。-introduce network security,include Qos attack,firewall,Intrusion Detection,Network Investigation and so on 17 chapters.
3
- The eight queens puzzle is the problem of placing eight chess queens on an 8×8 chessboard such that none of them are able to capture any other using the standard chess queen s moves. The queens must be placed in such a way that no two queens attack e
Pitch_ori_high_alpha
- root locus pitch orientation for high angle of attack using matlab
1
- 雷击是严重自然灾害,被世界气象组织列为十大自然灾害之一。随着计算机技术和电子信息的不断发展,日益繁忙庞杂的事务通过高速电脑、自动化设备及通讯设备得以井然有序,而这些敏感电子设备的工作电压却在不断降低,其数量和规模不断扩大,因而它们受到过压特别是雷电袭-Lightning is a serious natural disasters, by the World Meteorological Organization as one of the top ten natural disasters.
phone
- 手机攻击器,恶意攻击别人是不道德的. 本程序可能会造成被攻击者的反感. 甚至部分功可能会引起被攻击者的电话 损坏,请使用者注意后果. 凡是使用本程序造成的任何后果程序作 者不承担任何责任.-Mobile device attacks, malicious attack others is immoral. This procedure may result in the attacker' s offensive. Even some of the
vertex
- 该程序可用于计算无后缘后掠角的平板梯形翼在小攻角时升力与升力系数-This program can be used to calculate the plate without posterior trapezoidal wing sweep angle of attack in the small lift and lift coefficient
DoS-Attacks.pdf
- Denial of service attack on websites explored.
shuiyin
- 在一幅图像中加入水印,对水印进行抽取,并进行各种抗攻击实验。-To add a watermark in an image, the watermark extraction, and various anti-attack experiment.
marketplace0612
- 享受网上商城首选新蛋官网!特惠出击,笔记本,数码通讯,显示器,家电百货便宜到底!100 行货,货到付款, 还可赢世博门票 网上商城-New Egg Online Shopping Mall Enjoy the official website of choice! Preferential attack, laptops, digital communications, displays, home appliances department store cheaper in the end!
antidlfile-1.4
- CS 1.5 防 cmd dlfile 攻击补丁 === === === === ===== CS 1.5 已经非常 老了,但是仍然有很多玩家喜欢 CS 1.5。 CS 1.5 有很多 BUG,其中一个BUG,就是当参数 sv_allowdownload 为 1 时,玩家可以通过在控制台输入类似如下命令 "cmd dlfile maps/de_dust2.bsp" 攻击服务器。 这个插件可以修复此BUG。 一、需求 metamod v1.19
EightQueensProblem
- 在8*8的国际象棋盘上放置八个皇后,使其不能互相攻击,用递归法求出所有布局-8* 8 placed on the international chess board eight queens, so that it can not attack each other, all the layout obtained by recursion