Internetwork Routing Protocol Attack 程序
标签: Internetwork Protocol Routing Attack
上传时间: 2014-01-24
上传用户:fanboynet
ip land Attack by msdos
上传时间: 2015-12-25
上传用户:日光微澜
C++ implementaion for RSA together with the Wiener Attack. It uses NTL library for big numbers
标签: implementaion for together library
上传时间: 2017-07-05
上传用户:小鹏
This program finds the locations of placing n queens in a n*n chessboard so that none Attack any other
标签: chessboard locations program placing
上传时间: 2014-11-17
上传用户:ma1301115706
german side channel Attack description
标签: description channel german Attack
上传时间: 2014-01-24
上传用户:caixiaoxu26
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber Attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded Attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
上传时间: 2013-11-17
上传用户:llwap
Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to Attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.
上传时间: 2014-12-24
上传用户:熊少锋
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary Attack, key generator, distributed network Attack and some other methods, it s based on wepAttack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
五子棋小游戏#include<stdlib.h> #include<time.h> #include<stdio.h> #include<conio.h> int chess[169]={0} /*棋盘*/ struct chess_t/*作为辅助,即是作为建意*/ { char Attack /*攻防用的,0表示守,1表示攻*/ int j /*作为优先级用*/ }chess_a[169]
上传时间: 2016-05-18
上传用户:anng
本目录下存放了演示web应用安全技术的例程序,具体用法如下: 1.Attack目录是演示JSP安全性漏洞及对策的web应用程序,可以直接部署到应用服务器并运行。 2.security目录下存放演示保护web资源的例程序,tomcat子目录下存放可以在tomcat下运行的web应用程序(security目录)及在 tomcat下配置安全域的配置文件样例(配置文件目录), weblogic子目录存放可以在weblogic下运行的web应用程序。
上传时间: 2014-01-17
上传用户:lyy1234