The Craft of System Security by Sean Smith; John Marchesini List of Figures 1.1 An access control matrix 7 1.2 Security and state spaces 10 2.1 Example clearance order 26 2.2 Example categories order 27 2.3 Example MLS lattice 28 2.4 The *-Property
1,01.zipDialogs in DLL在DLL中实现对话框(5KB)2,02.zipExport dialogs in MFC Extension DLLs在MFC扩充DLL中输出对话框(12KB)3,03.zipRemapping resource scr ipt ID's重影象资源的标识符(4KB)4,04.zipDetermine DLL version number检测DLL的版本号(7KB)5,05.zipGetting the complete information abo
Here is a list of major features implemented in sqlmap: * Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end. Besides these four DBMS, sqlmap can also identify Microsoft Access, DB2, Informix and
该版本是1.6主线上的最新版本,主要修复了大量的BUG。包括: BUG修复列表: Ajax #9255:修复webkit内核浏览器中jQuery.parseXML不能处理异常的问题。 #9854:Pass statusText through instead of “normalizing” it #9887:修复jQuery.ajaxSetup可能导致内存浪费的问题。 #9970:Typo in ajax.js:status should be jqXHR.status #10098:Enc
局域网渗透软件 usage: hijack | -h is help/usage 显示帮助信息 -V is version information 显示版本信息 -v is be verbose 程序运行时显示详细信息 -q is be quiet (don't print packet reception hash marks) 安静模式,不显示数据包标识 -e is show empty packets 显示空的数据包 -o is fixed '\0'
Usage: ora [-u user] [-i instance#] [] General -u user/pass use USER/PASS to log in -i instance# append # to ORACLE_SID -sid set ORACLE_SID to sid -top # limit some large queries to on # rows - repeat Repeat an coomand time. Sleep between two
au3反编译源码 myAut2Exe - The Open Source AutoIT scr ipt Decompiler 2.9 ======================================================== *New* full support for AutoIT v3.2.6++ :) ... mmh here's what I merely missed in the 'public sources 3.1.0' This program is f
[PHP] ;;;;;;;;;;;;;;;;;;; ; About php.ini ; ;;;;;;;;;;;;;;;;;;; ; PHP's initialization file, generally called php.ini, is responsible for ; configuring many of the aspects of PHP's behavior. ; PHP attempts to find and load this configuration from a
Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit
Python library that provides NTLM support, including an authentication handler for urllib2. Works with pass-the-hash in additon to password authentication.
Java Basics 1. What is the difference between JDK and JRE? 2. What is Java Virtual Machine (JVM)? 3. What are the different types of memory areas allocated by JVM? 4. What is JIT compiler? 5. How Java platform is different from other platforms? 6. W
mimikatz
mimikatz is a tool I've made to learn C and make somes experiments with Windows security.
It's now well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-t
论文 - Making Big Data Open in Edges: A Resource-Efficient Blockchain-Based Approach872
lEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. VOL 30. NO. 4. APRIL 2019
mobile edge computing collaboration in 5G ecosystem. The and the throughput can ach