搜索资源列表
hwb12pdf
- 硬盘以及分区结构简介。 硬盘分区表和文件分配表 硬盘只有经过物理格式化,分区,逻辑格式化后才能使用,在进行分区时,FDISK 会在硬盘的0柱面0磁头1扇区建一个64字节的分区表,在分表的前面是主引导记录 (MRB),后面是两个字节的有效标志55H,AAH,(H表示16进制)。此扇区被称为主 引导扇区,也是病毒最爱侵袭的地方,它由主引导记录+分区表+有效标志组成。 分区表对于系统自举十分重要,它规定着系统有几个分区;每个分区的起始及终止 扇区,大小以及是否为活动分区等重要信息。
10517-080605-0303B01-27
- 通过介绍网络上几种常见的攻击方式(电子欺骗攻击、拒绝服务攻击、同步攻击、Web欺骗攻击、密码攻击、木马程序攻击等),然后就这些攻击方式提出相应的防范措施,最后就个人防范网络攻击提出了一些相关的策略。本文从以上方面来阐述在网络给人们带来诸多好处的同时,也带来了一些不可避免的负面影响,本文主要是为了有效地防范网络攻击,维护自己的权益不受侵犯,就需要我们尽量了解网络攻击的各种原理和手段、网络中存在的各种漏洞,以便及时维护我们的系统。 关键字:网络安全,网络攻击,防范措施 -by introdu
watermark_2
- 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet tran
Attacks.tar
- A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
Wavelet_based_full_scale_adaptive_digital_watermar
- 自适应全尺度小波数字图像水印.09年5月份 在清华学报出版的。实现大容量的水印嵌入,对于各种攻击的鲁棒性。请大家共享-Full-scale wavelet adaptive digital image watermarking .09 years in May, published in the Journal of Tsinghua University. The realization of large-capacity watermark embedding, the robustne
Asequence-basedembeddedDCTdomainwatermarkingalgori
- ,应用MATLAB仿真按序选择嵌入位的DCT变换算法,对仿真程序运行后的各种参数 和效果图的变化进行了分析;最后结合GUI开发设计出数字水印执行过程仿真控制界面,并用常见的水印攻击测试了该算 法的鲁棒性。-Application MATLAB simulation embedded spaces in sequence selection algorithm of DCT transform, simulation program running on the various param
Security.Evaluation
- 在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实 时流量的安全状况评估方法. -Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situat
4
- Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simp
Soccerrobotbasedontheshortestpathplanningattacks.r
- 基于时间最短的足球机器人进攻路径规划,:足球机器人 进攻 路径 Bezier 曲线 比赛环境-Soccer robot based on the shortest path planning attacks,: soccer robot attack path Bezier curve game environment
charset-attack-in-webapp
- Web应用程序中的字符集攻击 目录 为什么要讨论字符集攻击 字节流和数据的本质 web架构层次 web数据处理流程 字符集处理过程中可能出现的安全问题 web各个层中的字符集攻击 其他可能出现的攻击 在应用程序中避免出现字符集问题 -Web application character set attack Directory Why attack the character set to be discussed Byte str
Synchronized-attacks-watermarking
- 抗同步攻击鲁棒性数字水印技术研究论文,很具参考价值,值得下载。-Synchronized attacks against digital watermarking technique robust research papers, it is a reference value, it is worth downloading.
fangyudaodan
- 防御导弹的代码 某国为了防御敌国的导弹袭击,发展出一种导弹拦截系统。但是这种导弹拦截系统有一个缺陷:虽然它的第一发炮弹能够达到任意的高度,但是以后每一发炮弹都不能高于前一发的高度。某天,雷达捕捉到敌国的导弹来袭。由于该系统还在使用阶段,所以只有一套系统,因此有可能不能拦截所有的导弹。-Code missile defense A country to defend against enemy missile attacks, to develop a missile defense s
IMPLEMENTATION-AND-ANALYSIS-OF-VARIOUS-ATTACKS-ON
- implementation project
tfn2k
- tfn2k是DOS攻击的典型攻击工具,这个文档主要介绍tfn2k怎么移植到linux平台上面,以及怎么发起dos攻击-tfn2k is a typical DOS attack attack , this document describes the way the tfn2k work on the linux platform , and how to launch dos attacks
final
- Grid Web Services are new and rapidly evolving systems that provide services and share resources over a network. Web Services use Extensible Markup Language (XML) messages that follow the Simple Object Access Protocol (SOAP) standard and have been po
WebScarab
- 一个用来分析使用HTTP和HTTPS协议的应用程序框架,可以用来学习HTTP协议 我更多的是用来对自己做的网站进行注入攻击,以确保自己开发的网站的安全性足够 网上大家常用httpwatch来分析网页数据,但是HttpWatch只能分析,不能进行网站攻击,如果要攻击,通常还要加上nc瑞士军刀,可是即使是这样,对某些需要登录的网站,常常也无能为力 而WebScarab直接就可以在提交时修改数据,实时攻击,即实现先登录,再攻击-A application framework used
FOGCOMPUTING
- Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
SqlInjection
- This document discusses the problem, gives examples, then explains some defences that can be put in place to reduce exposure to these attacks. The aim is to reach the widest audience, therefore including technical details with explanatory notes where
Manipulating_SQL_Server_Using_SQL_Injection
- This document discusses the problem, gives examples, then explains some defences that can be put in place to reduce exposure to these attacks. The aim is to reach the widest audience, therefore including technical details with explanatory notes where
Reduce-the-Password-Guessing-Attacks-using-Click-
- TITLE FOR PASSWORD GUESSING ATTACKS