搜索资源列表
Digital_Signature
- 简单地说,所谓数字签名就是附加在数据单元上的一些数据,或是对数据单元所作的密码变换。这种数据或变换允许数据单元的接收者用以确认数据单元的来源和数据单元的完整性并保护数据,防止被人(例如接收者)进行伪造。-Simply put, the so-called digital signature is attached to the data unit on some data, or data unit by changing the password. Such data or transform
dnsspoof
- 实现了在arp欺骗环境下,对DNS的伪造攻击-Arp deception to achieve in the circumstances, the forgery attack on the DNS
wordpress-3.1.1-zh_CN
- WordPress 3.1.1 中文版本现已发布。此版本是修订版本,修复了 3.1 中包含安全问题在内的近 30 个问题。几个重要更新内容: 加强媒体文件上传的安全性 性能改进 增加对 IIS6 的支持 修正分类和 PATHINFO(/index.php/)的固定链接问题 修正了在某些极端情况下,数据库查询和分类法相关内容可能导致插件不兼容的问题 3.1.1 版本包含了我们的安全团队成员、WordPress 核心开发者 Jon Cave 和 Peter W
wangluozhongjiezhe
- 一个主机接收到与自已相同IP发出的ARP请求就会弹出一个IP冲突框来。利用局域网终结者可以伪造任一台主机的IP向局域网不停地发送ARP请求,同时自已的MAC也是伪造的,那么被伪造IP的主机便会不停地收到IP冲突提示,致使该主机无法上网。这便构成了局域网终结者的攻击原理。 -A host receives the same with their own IP ARP requests issued by an IP conflict box will pop up to. Terminator c
GargHailuSridharan
- Image Forgery Identification Using JPEG Intrinsic Fingerprints
copymove
- Detection of Copy-Move Forgery in Digital Images
image_forgery_detector
- Image forgery detection source code.
detect_copymove
- Ad-hoc algorithm for copy-move forgery detection in images
nps1D41.tmp
- DCT Based Digital Forgery
maram
- MATLAB code for image forgery detection
IEHelpforad
- IE 劫持,BHO。自动搜索,伪造来路,完美过360 安全卫士。-IE hijacked, BHO. Automatic search, forgery the antecedents, perfect over 360 security guards.
WS_PartII
- Part II:Client-State Manipulation,Cross-Site Request Forgery (XSRF) and Cross Site scr ipt Inclusion (XSSI) 第十五周的答案-Part II:Client-State Manipulation,Cross-Site Request Forgery (XSRF) and Cross Site scr ipt Inclusion (XSSI)
land
- 根据tcp/ip协议的land攻击,伪造ip用目标主机的ip攻击目标主机-Ip tcp/ip protocol land attack, forgery ip target host target host
naxsi-ui-0.49
- Naxsi是一个开源,高性能,低维护规则,nginx的Web应用程序防火墙模块,著名的Web服务器和反向代理。 它的目标是帮助人们保护其Web应用程序,对跨站脚本,SQL注入,跨站请求伪造,本地和远程文件包含攻击-Naxsi is an open source, high-performance, low-maintenance rules nginx' s Web application firewall module, a well-known Web server and rev
Securing-Web-applications
- Web application vulnerabilities have become a major concern in software security. This paper will present major attack patterns, i.e. SQL injection, cross-site scr ipting, cross-site request forgery, Javascr ipt hijacking, and DNS rebinding, together
blockhandling
- Image forgery detection
work
- 实现运动模糊图像的复原,可检测伪造图像,并且分类出伪造子块-Achieve motion-blurred image restoration, image forgery can be detected, and the classification of counterfeit sub-block
CopyPaste
- Copy pasted Image forgery detection.
ECoMark
- Eco mark copy move forgery detection.
StereoRegion
- Copy move forgery detection using stero region.