搜索资源列表
仿真设计作品--休想逃--麓 瑜 圆
- 仿真设计作品--中国闪烁式隐型坦克matlab语言仿真-simulation design works -- the Chinese-style covert scintillation tanks Matlab language simulation
sqlView
- 程序采用多线程序执行SQL语句,另外集成了数据导出功能(生成.txt文件,可用EXCEL以逗号分隔符的形式打开,可以说是一种变相的导出为EXCEL的功能,但不依赖于安装EXCEL才能运行),此程序本是我用来调试SQL语句的,现将其公布给大家使用-procedures for multi-line procedures for the implementation of SQL, Another integration of data derived function (production. t
covert(C++)
- 大地坐标转换直角坐标的C++代码(高斯克吕格投影) -earth Cartesian coordinates conversion of C code (high Shikelu:ge projection)
batNetVirus
- 一个利用windows弱密码进行传播的蠕虫,使用dos编写,有隐蔽传播,开机自运行等一般病毒具有的特性,仅用于学习用途:)-windows using a weak password worm spreads, the use of dos preparation, a covert dissemination startup operation since the general characteristics of the virus is only for learning purpose
568q-pdf-cpp
- source code: Covert TXT to PDF
cctt-0.1.8.tar
- Cctt, \"Covert Channel Tunneling Tool\" - 顾名思义,这是一种隐藏通道工具。他提供几种可行方法来实现允许在已被网络访问控制系统授权的数据流上创建并建立任意数据流传输信道。-Cctt, "Covert Channel Tunneling Tool" - the name implies, this is a hidden channel tools. He provided several possible ways to achieve
实现了读取bmp图像到矩阵的转换
- 实现了读取bmp图像到矩阵的转换,是个很好的头文件,直接引入就能用,this code can covert bmp to matrix,
Covert-channels
- tcp 隐蔽 信道 植入 信息 tcp/ip下隐蔽信道的实现 -tcp hiding information
UDiskMonitor
- 功能概括 1. 自动监测U盘插入事件 2. 后台拷贝U盘文件内容到指定目录 3. 后台隐藏模式隐蔽运行 4. 可选随系统自动启动-Feature summary 1. Automatic Monitoring U disk insert events 2. Background U disk copy the contents of the documents to the designated directory 3. Background hidden covert oper
DelphiHOUTAIJIANKONG
- 后台监控软件,为了达到隐蔽监控的目的,应该满足正常运行时,不显示在任务栏上,在按Ctrl+Alt+Del出现的任务列表中也不显示,管理员可以通过热键调出隐藏的运行界面。要作到这些,必须把当前进程变为一个系统服务,并且定义全局热键。 -Background monitoring software, in order to achieve the purpose of covert monitoring should meet the normal run-time, do not appear i
covert
- 在MFC中打开一幅BMP图像,24位,32位均可,也可以使24位图像转化为8位灰度BMP。-In MFC BMP image to open a 24-bit, 32-bit can also make 24-bit images into 8-bit grayscale BMP.
headconv
- 将C的头文件转为delphi,对雨将c转为delphi 的工作很有帮助-covert c.h to delphi
UWB_DSSS
- It has been suggested1 that an appropriate figure of merit for a low probability of intercept and detection (LPI/D) waveform is the quantity “Range x Bandwidth / Joule”. That is, the further the range, the wider the bandwidth and the less amount
dns2tcp-0.4.3.tar
- DNS2TCP 0.4.3 TCP Covert Tunnel over DNS-DNS2TCP 0.4.3TCP Covert Tunnel over DNS
ConvertAccesstoExcel
- 转换Access数据库为Excel文件(VB6 源码)-simple MS Access covert to Excel App
covert-channel-(c-language)
- linux中隐蔽通道源代码(c语言) 采用sleep(秒)/usleep(微秒)制造同步。 当一个进程sleep时,就将cpu的控制权交给其他进程,直到sleep时间已到,重新获得cpu的控制权。 -linux source code in the covert channel (c language)
ICMP-covert-channel
- ICMP隐蔽信道实现,包括嵌入算法和提取算法-ICMP covert channel,includeing the Embedding Algorithm and the Extraction algorithm.
covert
- 批量将多条数字转换为二进制,八进制,十六进制。比windows自带的好很多-covert lots of the decimal system to others systems automatically
Time-covert-communication
- 基于http隐蔽通信,主要用于发送隐蔽信息。代码中包括详代码注释。-Http covert communication based mainly used to send hidden messages. Code includes detailed code comments.
covert-channels-master(2)
- Covert-Channels-master