您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. dma 架构原理详细分析

  2. Overview In computer-based data acquisition applications, data incoming or outgoing through computer I/O devices must often be managed at high speeds or in large quantities. The three primary data transfer mechanisms for computer-based data acquisit
  3. 所属分类:硬件开发

  1. SessionHijacking

  2. With the emerging fields in e-commerce, financial and identity information are at a higher risk of being stolen. The purpose of this paper is to illustrate a common cum valiant security threat to which most systems are prone to i.e. Session Hijackin
  3. 所属分类:其它

    • 发布日期:2009-10-08
    • 文件大小:37kb
    • 提供者:eqmcc
  1. 英语新视野3答案如下,大家看

  2. 1. Because this is a title bought with stolen money. The guy’s real name is Anthony Williams. 2. It’s small, with a population of only 320. 3. No. He looks like a Scottish noble, soft-spoken and wealthy. The truth is that the man with endless money
  3. 所属分类:专业指导

    • 发布日期:2010-03-17
    • 文件大小:381kb
    • 提供者:aloha001
  1. Beautiful Security: Leading Security Experts Explain How They Think

  2. In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses
  3. 所属分类:Web开发

    • 发布日期:2010-03-23
    • 文件大小:2mb
    • 提供者:sfwong
  1. 加州圣巴巴拉大学(UCSB)的计算机病毒科学家们对僵尸网络torpig

  2. Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:784kb
    • 提供者:borelist
  1. Beautiful Security: Leading Security Experts Explain How They Think

  2. In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses
  3. 所属分类:Web开发

    • 发布日期:2010-05-17
    • 文件大小:2mb
    • 提供者:blue_thinhorse
  1. Private Exe Protector Version 3.2.2 (demo)

  2. Version 3.2.2 (08/09/2010) * New: o New feature in keygen - extract user field from license file o New UI of keygen, user now can define [user-bitset names] o UI: new menu option [Save project as] o Add special feature [Hide file from Antivirus] - a
  3. 所属分类:C++

    • 发布日期:2010-09-27
    • 文件大小:1mb
    • 提供者:tiantian123445
  1. Programming Ruby, The Pragmatic Programmer

  2. Programming Ruby The Pragmatic Programmer's Guide This book is a tutorial and reference for the Ruby programming language. Use Ruby, and you'll write better code, be more productive, and enjoy programming more. These are bold claims, but we think th
  3. 所属分类:Web开发

    • 发布日期:2011-03-05
    • 文件大小:784kb
    • 提供者:chennao
  1. Aspr2.xx IAT fixer v2.2s 脚本

  2. Aspr2.xx_IAT_fixer_v2.2s 脚本支持 Asprotect 1.3x 和 2.x 加壳的EXE /DLL , 包括高级输入表保护选项 使用: 把目标载入 Ollydbg 并运行脚本直到出现 可选 按 Yes 键 -- 脚本将立即修复 Call xxxxxxx . 按 No 键 -- 脚本修复 Call xxxxxxx 的地点就跟 IAT fixer v1.02的一样. 按 Cancel 键 -- 这时一切就靠你自己. 到了 OEP 或 stolen code 的第一句(如有
  3. 所属分类:网络攻防

    • 发布日期:2011-06-14
    • 文件大小:41kb
    • 提供者:myi7iscss
  1. The Stolen Child

  2. Don't call me a fairy. We don't like to be called fairies anymore. Once upon a time, fairy was a perfectly acceptable catchall for a variety of creatures, but now it has taken on too many associations. Etymologically speaking, a fairy is something q
  3. 所属分类:专业指导

    • 发布日期:2011-09-24
    • 文件大小:1mb
    • 提供者:vaonao
  1. Formal Correctness of Security Protocols

  2. This book describes a key technique, the Inductive Method, for proving the correctness of security protocols. It is clearly written, starting with the basic concepts of cryptography and leading to advanced matters such as smartcards and non-repudiat
  3. 所属分类:专业指导

    • 发布日期:2012-03-29
    • 文件大小:3mb
    • 提供者:bbikemin
  1. DB2性能调整的10个技巧

  2. 这篇文章主要是针对e-business OLTP的10个性能方面的Tips。 10. Monitor Switches 打开Monitor Switch,才能获得性能方面的信息,命令如下         db2 "update monitor switches using lock ON sort ON bufferpool ON uow ON table ON statement ON" 9. Agents 要保证有足够的agent应付系统负载 命令:db2 "get snapshot fo
  3. 所属分类:DB2

    • 发布日期:2012-07-13
    • 文件大小:39kb
    • 提供者:onroad99
  1. OK6410 rootfs led/btn drivers dot-config

  2. Including kernel and busybox configurations, skeleton rootfs, and LED/buttons' device drivers. Stolen from Internet. All are tested.
  3. 所属分类:Android

    • 发布日期:2012-10-19
    • 文件大小:109kb
    • 提供者:xw1197
  1. 电脑的10大安全隐患

  2. Pc world电脑的十大安全隐患如your stolen data free on the web
  3. 所属分类:专业指导

    • 发布日期:2013-08-23
    • 文件大小:3mb
    • 提供者:piaoliuweifeng
  1. DiskStolen

  2. 监测系统新增驱动器,并实现拷贝。 dir_now = Directory.GetLogicalDrives(); int newdisk; //有新增盘 if (dir_now.Length > dir_old.Length) { newdisk = dir_now.Length - dir_old.Length; string nowtime = DateTime.Now.ToString(); string rslt; rslt = nowtime.Replace(":", "-")
  3. 所属分类:Java

    • 发布日期:2008-09-23
    • 文件大小:212kb
    • 提供者:yoy4585
  1. Packer(Hook IAT + stolen Codes)

  2. 加壳器 包括技术:Hook IAT, stolen codes,动态加载 编程语言:汇编。
  3. 所属分类:其它

    • 发布日期:2013-09-28
    • 文件大小:100kb
    • 提供者:yuran1201
  1. 手脱ASProtect1.23 RC4

  2. 1.OEP 2.解密IMPORT 3.修复STOLEN CODE 1.OEP比较好找,断到最后一次异常后开始单步跟踪,最终一个跨段转移就到了入口,但是是被STOLEN之后的入口了,STOLEN CODE在转移之前就已经被执行。 2.ASPR1.23RC4对KERNEL32.DLL里的API做了IAT HOOK,所以需要将其IAT HOOK去掉进行还原,然后IAT表里不同DLL的函数地址表应该是用0来分隔,但是ASPR用了随机数,这里要清0,还有个别的API是将API代码COPY到程序中直接使用
  3. 所属分类:其它

    • 发布日期:2014-02-23
    • 文件大小:18mb
    • 提供者:u011500307
  1. The.Enigma.Protector.x32.v4.30_DEMO_Modified_Crack

  2. The Enigma Protector v4.30 Build 20150225 - Protection core improvements - Improved Hardware ID detection of HDD Serial - Bug fixed loading stolen keys from keygen database for command line version - Bug fixed loading relocation directory - Minor bu
  3. 所属分类:系统安全

    • 发布日期:2015-03-03
    • 文件大小:24mb
    • 提供者:aqtata
  1. The.Enigma.Protector.x64.v4.30_DEMO_Modified_Crack

  2. The Enigma Protector v4.30 Build 20150225 - Protection core improvements - Improved Hardware ID detection of HDD Serial - Bug fixed loading stolen keys from keygen database for command line version - Bug fixed loading relocation directory - Minor bu
  3. 所属分类:系统安全

    • 发布日期:2015-03-03
    • 文件大小:25mb
    • 提供者:aqtata
  1. HEIST: HTTP Encrypted Information can be Stolen through TCP-windows

  2. 在Black Hat 2016大会上,两名比利时的安全研究人员展示了他们今年的研究成果。他们发现了一个WEB攻击方式可以绕过HTTPS加密得到明文信息。他们把这种攻击方式叫做HEIST攻击。HEIST的全称是Encrypted Information can be Stolen through TCP-Windows。大体意思就是通过TCP-Windows协议可以窃取到加密的明文信息。
  3. 所属分类:网络安全

    • 发布日期:2016-09-14
    • 文件大小:599kb
    • 提供者:euler2012
« 12 »