The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1.0.0 and below.
资源简介:the tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender rootkit. the tool connect to the remote host, and compares the reply to several known replies. the rootkits that can be dete...
上传时间: 2016-02-21
上传用户:gundan
资源简介:an approach for capturing similarity between words that was concerned with the syntactic similarity of two strings. Today we are back to discuss another approach that is more concerned with the meaning of words. Semantic similarity is a con...
上传时间: 2014-01-05
上传用户:wmwai1314
资源简介:the first decision, that has to be made for the AVR platform, is to select the development environment you want to use, either ImageCraft s ICCAVR or GNU s AVR-GCC. the commercial ImageCraft Compiler offers an advanced IDE and is the fir...
上传时间: 2017-04-21
上传用户:从此走出阴霾
资源简介:the famous tool used to detect the memory leak
上传时间: 2015-06-24
上传用户:talenthn
资源简介:Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth exa...
上传时间: 2014-01-02
上传用户:Late_Li
资源简介:To detect the face from any gray image
上传时间: 2014-01-14
上传用户:lvzhr
资源简介:To detect the face from the image
上传时间: 2017-08-24
上传用户:hebmuljb
资源简介:MemCheck Driver Memory Tool the MemCheck code is designed to provide Windows NT/2K/XP driver developers with a tool to help in the detection of the following memory handling issues: Buffer overrun Buffer corruption Buffer use after buffer r...
上传时间: 2014-12-05
上传用户:weiwolkt
资源简介:this program is used to detect the corner of image
上传时间: 2015-06-13
上传用户:SimonQQ
资源简介:TrainReset:there are many trains need to drive out of the station .In terms of their numbers from small to large.there are only three railways used to place the trains ,and also need the same order.
上传时间: 2015-07-04
上传用户:moerwang
资源简介:This program provides an example of how to configure the C8051F02x device to operate from an external 22.1184MHz crystal attached to the XTAL1 andXTAL2 pins. Also enables Missing Clock Detector.
上传时间: 2014-01-09
上传用户:1079836864
资源简介:From the Publisher Focus on 2D in Direct3D? teaches you all of the tools and tips you ll need to dive right in and begin creating your own games. If you have some knowledge of C or C++ and have been searching for a guide that will take you...
上传时间: 2015-09-01
上传用户:ve3344
资源简介:When I use opencv, I use this very useful paper to begin the study. This is all I searched from the internet informations.
上传时间: 2014-01-12
上传用户:lht618
资源简介:This designs uses a Nios II system to demonstrate how to read from the SD card. the software reads WAV files from the SD card and plays it through the LINE OUT line. Simply put a SD card into the slot on the board and connect some speakers ...
上传时间: 2015-10-26
上传用户:lizhen9880
资源简介:This program allows reading or writing values to and from the DSP through hyperterminal serial port interface.
上传时间: 2014-01-19
上传用户:gyq
资源简介:the algorith divides rows in to four equal groups. the rows are then used to from a distance graph which is then transformed into a matrix. girth of eight is maintained by avoiding six-cycles in the graph construction
上传时间: 2014-01-15
上传用户:kelimu
资源简介:// chebysheve outlier detection // this function is used to detect the abnormal value among a set of data // input: // delta: a set of data // flag: discribe which data is already known as outlier // p: restrict level // output: // ...
上传时间: 2013-11-30
上传用户:13517191407
资源简介:using 18b20 to detect the temp,and show it o
上传时间: 2013-11-29
上传用户:410805624
资源简介:this a user-mode application to detect device change on the system, i.e. plug-in a USB drive, iPod, USB wireless network card, etc.
上传时间: 2014-01-05
上传用户:lmeeworm
资源简介:All the tool for build a network able to reconize any shapes. Very complete, a good base for anything you want to do whith acknowledge, and neural network
上传时间: 2017-03-09
上传用户:qq21508895
资源简介:the example that shows how to use int2e trick to use ZwSetInformationThread to hide from ring3 debuggers
上传时间: 2014-12-05
上传用户:181992417
资源简介:This is Sybase book. Let me know the feedback after reading this book. Good to hear from you. Bye
上传时间: 2013-12-17
上传用户:shus521
资源简介:Program Description: the program asks the user to choice from the menu an option A. Check to see if a number is prime. B. Count the number of vowels in a line. X. Exi...
上传时间: 2017-04-08
上传用户:磊子226
资源简介:THIS DOCUMENT IS PROVIDED TO the USER AS IS . Etc.etc. Data from HITACHI LIQUID CRYSTAL CHARACTER DISPLAY MODULE and OPTREX DOT MATRIX LCD MODULE databooks
上传时间: 2013-12-16
上传用户:yuchunhai1990
资源简介:face detector to detect face area in the given image
上传时间: 2014-01-01
上传用户:2404
资源简介:the material contains all aspects of game creation. From the design in UML up to main requirements.
上传时间: 2013-12-23
上传用户:xiaohuanhuan
资源简介:Advanced PIC Microcontroller Projects in C from USB to RTOS with the PIC18F Series (Ebook)
上传时间: 2013-12-20
上传用户:banyou
资源简介:book abt Advanced PIC microcontroller projects in C from USB to ZIGBEE with the pic 18F series
上传时间: 2017-08-08
上传用户:cxl274287265
资源简介:This code is used to detect the face
上传时间: 2013-12-11
上传用户:daguda
资源简介:This book provides the reader with the basics in radio engineering, the techniques needed to generate, control, detect, and use radio waves. the text approaches the relevant problems both from the electromagnetic theory based on Maxwell...
上传时间: 2014-01-17
上传用户:rocketrevenge