虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Have

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed Have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.

    标签: Server SQL Injection Microsoft

    上传时间: 2014-07-28

    上传用户:xhz1993

  • 本人大二学习汇编语言程序设计时的全部源代码

    本人大二学习汇编语言程序设计时的全部源代码,均已经编译通过生成可执行文件,每个目录是一个程序。希望对学习汇编语言的同志有所帮助。-my sophomore year learning assembly language programming at all the source code, Have already generated by compiler executable files, each directory is a process. Want to learn assembly language comrades help.

    标签: 汇编语言 程序设计 源代码

    上传时间: 2013-12-17

    上传用户:zmy123

  • zlibyou can found an optimized version of Zlib 1.1.4 that you can embed into every Delphi executable

    zlibyou can found an optimized version of Zlib 1.1.4 that you can embed into every Delphi executable without use external dlls. Further I Have build a little example hoping to aid "young" Delphi programmers getting in trouble with streams... Please let me know if you ll discover errors. These objects and sources are targeted for executing into P6+ CPU core, and Delphi5-6-7-x software. Benchmarks show this zlib 40% average faster than native DLL distribution and 100% reliable.

    标签: executable can optimized zlibyou

    上传时间: 2016-12-19

    上传用户:lili123

  • An adaptive fuzzy integral sliding mode controller for mismatched time-varying linear systems is p

    An adaptive fuzzy integral sliding mode controller for mismatched time-varying linear systems is presented in this paper. The proposed fuzzy integral sliding mode controller is designed to Have zero steady state system error under step inputs and alleviate the undesired chattering around the sliding surface

    标签: time-varying controller mismatched adaptive

    上传时间: 2014-12-04

    上传用户:luopoguixiong

  • We address the problem of predicting a word from previous words in a sample of text. In particular,

    We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on the frequency of their co-occurrence with other words. We find that we are able to extract classes that Have the flavor of either syntactically based groupings or semantically based groupings, depending on the nature of the underlying statistics.

    标签: predicting particular previous address

    上传时间: 2016-12-26

    上传用户:xfbs821

  • The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I Haven t

    The AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I Haven t tested other versions of GCC, but they should compile without too much difficulty. * The source files for the AVRcam had the author name and copyright information added back into them after the judging of the project, since it states in the competition rules that the author s name can not be present during their inspection. * The included source files are the ones that were submitted for the entry into the Circuit Cellar contest. I Have continued to develop the AVRcam, and Have added several new features (such as ignoring objects that aren t larger than a minimum size, removing tracked objects that overlap with each, and some general optimizations). If you are interested in the latest source, email me at john@jrobot.net * For more info about the AVRcam, check out http://www.jrobot.net John Orlando August 20, 2004

    标签: distribution version AVRcam source

    上传时间: 2016-12-30

    上传用户:GavinNeko

  • AR6001 WLAN Driver for SDIO installation Read Me March 26,2007 (based on k14 fw1.1) Windows CE Em

    AR6001 WLAN Driver for SDIO installation Read Me March 26,2007 (based on k14 fw1.1) Windows CE Embedded CE 6.0 driver installation. 1. Unzip the installation file onto your system (called installation directory below) 2. Create an OS design or open an existing OS design in Platform Builder 6.0. a. The OS must support the SD bus driver and Have an SD Host Controller driver (add these from Catalog Items). b. Run image size should be set to allow greater than 32MB. 3. a. From the Project menu select Add Existing Subproject... b. select AR6K_DRV.pbxml c. select open This should create a subproject within your OS Design project for the AR6K_DRV driver. 4. Build the solution.

    标签: installation Windows Driver March

    上传时间: 2014-09-06

    上传用户:yuzsu

  • ORACLE FOR SQL DE FILE

    ORACLE FOR SQL DE FILE ,AS EXAMPLE DE Have YOU DOING WHAT。

    标签: ORACLE FILE FOR SQL

    上传时间: 2013-12-23

    上传用户:chfanjiang

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals Have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • Many of the designations used by manufacturers and sellers to distinguish their products are claime

    Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designations Have been printed in initial caps or all caps. The authors and publisher Have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers discounts on this book when ordered in quantity for special sales. For more information, please contact:

    标签: manufacturers designations distinguish products

    上传时间: 2017-01-23

    上传用户:woshiayin