搜索资源列表
Intruder - Remote server control
- Remote server control
u9213343
- 我用Borland C++ 寫的視訊追蹤,裡面有一些安裝說明跟原始碼。內容為利用WEBCAM擷取到的影像,使用影像動態偵測的方式來判斷是否有入侵者闖入。希望大家喜歡-I use Borland C to write the follow-up video, which has some installation notes with the source code. WEBCAM content to use to capture images, the use of dynamic imagi
Md5Code
- 通过MD5加密后保存,和以往仅仅明文保存相比,MD5加密后的保存信息更加安全,毕竟MD5加密后的信息安全性更高,MD5加密方式也是单向的并不存在任何逆向破解。然而你是否知道MD5也并不是真正安全的,入侵者在获得了MD5加密后的字符串后依然可以通过多种方法破解成明文密码。下面就请各位IT168的读者跟随笔者从实战讨论MD5加密的安全性。 -MD5 encrypted through preservation, and preservation of the past, compared
TCP
- 扫描TCP端口是入侵者搜集目标主机开放端口的常用手法之一,而多线程的扫描能大大加快扫描速度。设置要扫描的起始IP和结束IP,开对应IP主机端口是否回复来证明是否开放-TCP port scan is a collection of target host intruder port open one of the common practices, and multi-threaded scanning can greatly speed up the scanning speed. Set u
intruder
- intruder radio alert system
intruderdetection
- this all about Intruder Detection and Recording-this is all about Intruder Detection and Recording
avr
- Hello guys, I ve built this GSM security system as my semester project using T290i mobile and controlled my car using it. Please leave your comments about it. If any one needs help in implementing such a system, I can help. Some of the fu
INVASION_SRC
- 一个简单是入侵者游戏,在游戏中,玩家控制飞船,一方面向敌机射击,另外还需要躲避敌人的子弹-A simple game is the intruder, in the game, players control the spacecraft, on the one hand to the enemy shooting, also need to avoid enemy bullets. . . .
intruder_detection
- this program is to detect any intruder in real time video and raise alarm.
jiajuC51
- 基于电话线通信的家居报警系统 总程序 包括温度和入侵者检测,语音报警拨号等等。-Home-based telephone line communication procedures, including general alarm system and intruder detection temperature, voice dialing, etc. alarm.
Invasion
- 编译Invasion.dsw文件,在Debug目录下会生成文件Invasion.exe,直接双击该文件,即可运行“入侵者”程序。要正确编译源代码,需要安装DirectX 8.0及其以上版本。-Compile Invasion.dsw file will be generated in the Debug directory file Invasion.exe, direct double-click the file, you can run the " intruder" p
Recognition_of_hackers
- The project titled Recognition of Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In
FINAL-REPORT
- intruder and motion detection system
game
- 用java模拟苍蝇的飞行轨迹,此算法还有入侵者,当入侵者少时苍蝇会攻击入侵者,而入侵者多少苍蝇会受到攻击.-With java analog flies flight path, the algorithm was an intruder when the intruder came from a fly will attack the intruder, while the number of flies will attack the intruder.
LuFanOpenCV_V1
- 项目设计并实现了一个具有闯入报警功能的智能监控系统。该系统包括视频采集、视觉分析与输出报警几个功能。其中视觉分析部分利用OpenCV图像处理技术对采集得到的图像进行处理,根据图像中是否包含闯入者进行判别报警。如果判别出有非法闯入者,系统自动启动记录,将视频内容保存入磁盘,并通过串口通信将报警信号发送给单片机进行报警,危机解除后,停止写入磁盘,并解除单片机报警信号!-Project design and implementation of an intelligent intrusion alar
Triple-springboard
- 网络入侵,安全第一。一个狡猾的、高明的入侵者,不会冒然实行动。他们在入侵时前会做足功课,入侵时会通过各种技术手段保护自己,以防被对方发现,引火烧身。其中,跳板技术是攻击者通常采用的技术。下面笔者结合实例,解析攻击入侵中的跳板技术-Network intrusion, safety first. A cunning, clever intruder, not the temerity to implement action. They will do their homework before t
stage
- The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security consi
WirelessIntruderDetectionSystem
- Intruder Detection System
61_Record
- 全自动语音商品介绍机,能自动介绍产品的信息,且能自动触发-langue intruder
9.Home-intruder-alert-system-using-GMAIL
- this document is intruder using gmail