搜索资源列表
socks5 remote exploit
- socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redh
7.2_Kphone4.2
- Kphone 是其于QT界面的开源SIP 软件电话,支持语音,视频和文字消息交流.经测试,可以在Redhat 9.0 直接编译通过.在Arm-Linux 上需要比较多移植工作 以下是Kphone 是在SBC2410 ,Arm-Linux 2.6.11 内核移植过 -QT are Kphone its software interface, open source SIP phone to support voice, video and text message exchanges.
src
- 与远程服务期的指定端口建立连接并发送测试数据,unix/LINUX redhat 2.6.18-92.el5上CC/gcc编译通过-it builds up a tcp connection with remoted server and assigned port,after connection built, it sends test data to the server, compiled with cc/gcc under unix/linux redhat 2.6.18-92.el5
patch-2.6.30.3.tar
- Update of /cvs/pkgs/rpms/kernel/F-11 In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv25310 Modified Files: .cvsignore kernel.spec linux-2.6-upstream-reverts.patch sources upstream Added Files: patch-2.6.30.4.bz2.sign Removed