搜索资源列表
huoju
- 火炬之光1.1 人物hp 攻击 等级 技能点修改-Torchlight attack rating 1.1 hp skill points character changes
w1
- Weiner Attack is an attack on rsa cryptography system-Weiner Attack is an attack on rsa cryptography system
Digital-Watermarking
- 抗几何攻击的数字水印技术综述Geometric Attack Resistant Digital Watermarking-Geometric Attack Resistant Digital Watermarking
CCSource
- 500毫升模拟攻击方法还赞助商链接usersAgent有一项功能,在接到用户要求将读取页面,不管用户是否已断开连接,从而极大地提高了我们的攻击效率,如果我们保持连接直接连接到其他服务器必须维持之前,通过运行一个代理,只要我们请求发送到代理可以断开,其余的是代理的事情。因此,我们只需将计算机来完成的代理- >“发送请求- >“断开,而不是需要为一些朋友等待返回的数据,以便程序可以达到这么高的线程-500 cc simulated attack method also sponsored
AeroModelHighAlpha
- 飞机大角度攻击的模型仿真程序,描述了在大角度攻击时的姿态控制参数的计算。-Model for large angle of attack aircraft simulation program, described the attack in the large angle attitude control parameter calculation.
game
- 用java模拟苍蝇的飞行轨迹,此算法还有入侵者,当入侵者少时苍蝇会攻击入侵者,而入侵者多少苍蝇会受到攻击.-With java analog flies flight path, the algorithm was an intruder when the intruder came from a fly will attack the intruder, while the number of flies will attack the intruder.
beigong
- DNF游戏攻击者基址修改 智能加攻 自动关闭-DNF game smart attacker to modify the base address plus attack shut down automatically
1
- 易语言DNF外挂 有改技能 3SSS 还有倍攻 很多功能-DNF easy language skills 3SSS plug has changed a lot of features there are times the attack
Untitled2
- 基于小波变换的图像数字水印技术 其中包括对图像的攻击 水印嵌入和提取的过程-Wavelet-based image watermarking techniques, including the attack on the image watermark embedding and extraction process
xycmsbook
- 基本功能 查看留言:默认一页显示5条信息,但用户可以自行修改显示条数,在index.asp文件中修改参数rs.PageSize =5即可 添加留言:添加留言加入了验证码,防止被灌水,同时也加入防简单的XSS攻击 管理留言:就是进入后台进行留言管理 后台路径:/system/index.asp 用户名、密码:admin -Basic functions of View message: The default page shows five messages, but
DT
- 静态木马检测源码 本项目基于扩展攻击树的静态木马检测 提供白名单功能 不需要数据库,相关数据量比较少,全部内嵌在代码中 makefile都写好了,windows下nmake就是了-Trojan detection of static source code of this project is based on extended attack tree Trojan detection provides static functions do not need to white
dnfquan
- NDF外挂源码,采用易语言编写,支持全屏攻击,可以放收费软件。-NDF external source, the use of easy language to support full-screen attack, you can put billing software.
arp-cheat
- arp 欺骗程序 可以实现物理地质的欺骗 使得被攻击主机的地址冲突 无法发送数据-arp spoofing program can make the physical geology of the attack spoofing the address of the host can send data conflict
dep
- dep保护攻击实验,在打开和关闭dep保护的环境下进行攻击-dep protection against experiments in open and closed dep attack under the protection of the environment
eight-queens
- 八皇后问题,是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。 高斯认为有76种方案。1854年在柏林的象棋杂志上不同的作者发表了40种不同的解,后来有人用图论的方法解出92种结果。计算机发明后,有多种方法可以解决此问题。 -Eight queens problem is an ancient and well-known pr
jg
- 一个进攻型虚拟足球机器人,具备进攻和防守的功能-An offensive virtual robot, with attack and defense capabilities
zlgfz
- ai-rcj4.0的虚拟足球机器人的进攻、防守讲解-ai-rcj4.0 virtual soccer robots attack, defense to explain
201106006123456
- IP欺骗的技术比较复杂,不是简单地照猫画老虎就能掌握,但作为常规攻击手段,有必要理解其原理,至少有利于自己的安全防范,易守难攻嘛。-IP spoofing technique is more complex, not simply according to the tiger cat picture can master, but as a conventional means of attack, it is necessary to understand its principles, at
NQueens
- 由n2个方块排成n行n列的正方形称为“n元棋盘”。如果两个皇后位于n元棋盘上的同一行或同一列或同一对角线上,则称它们为互相攻击。要求输出使n无棋盘上的n个皇后互不攻击的所有布局。 -By n2 a square lined up in n do n column square called "n yuan chessboard". If two queen on board in n yuan with a line or the same column or the same on the
gongji
- 口令攻击。可以实现破解弱口令。所以主机最好设置密码,防止被远程登录,攻击-Password attack. Can crack weak passwords. Therefore, the best host password, and prevent remote login, an attacker