Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.
标签: applications operating security software
上传时间: 2015-11-01
上传用户:fhzm5658
Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID Support blind transfer, single-step transfer/conference, consultation transfer/conference, hold, unhold. Control of the local phone handset, microphone and speaker of the modem Send and receive faxes Play and record on the phone line or sound card Play music in background mode Silence detection VU Meter Wave sound editor that allows your end-users to edit their own sound files. Voice recognition and voice synthesis. Full control over the serial port device ZModem file transfer utility File compression and encryption utility
上传时间: 2013-11-30
上传用户:水中浮云
this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The LC2 model can be run as a simulation or downloaded to the UP3 in a larger model, TOP_LC2 that adds video output. Push buttons reset and single step the processor and a video output display of registers is generated. This state machine VHDL-based model of the LC-2 includes all source files. Currently compiled for a Cyclone EP1C6Q240 FPGA.
标签: implementation include quartus source
上传时间: 2013-12-25
上传用户:坏坏的华仔
DAGON Approach Object of this exercise: Given a subject graph and a set of pattern graph in canonical representation (2-input NAND and INV), implement the second step of DAGON approach. (Both the subject graph and the pattern graphs are trees.)
标签: graph Approach exercise subject
上传时间: 2014-01-19
上传用户:stampede
We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the system needed to solve for each particle and ii) the factorization of the transition probability which allows the Rao-Blackwellization of the filtering step. Both simplifications can be implemented using the coarse projective integration framework. The resulting particle filter is faster and has smaller variance than the particle filter based on the original system. The convergence of the new particle filter to the analytical filter for the original system is proved and some numerical results are provided.
标签: construction separation time-scale particle
上传时间: 2016-01-02
上传用户:fhzm5658
ollydbg完全教程。OllyDbg 是一种具有可视化界面的 32 位汇编-分析调试器。它的特别之处在于可以在没有源代码时解决问题,并且可以处理其它编译器无法解决的难题。 一,什么是 OllyDbg? 二,一般原理[General principles] 三,反汇编器[Disassembler] 四,分析器[Analysis] 五,Object扫描器[Object scanner] 六,Implib扫描器 [Implib scanner] 七,如何开始调试[How to start debugging session] 八,CPU 窗口[CPU window] 九,断点[Breakpoints] 十,内存映射窗口[Memory map window] 十一、十二,监视与监察器[Watches and inspectors] 十三,线程[Threads] 十四,复制到剪切板[Copy to clipboard] 十五,调用栈[Call stack] 十六,调用树[Call tree] 十七,选项[Options] 十八,搜索[Search] 十九,自解压文件[Self-extracting (SFX) files] 二十,单步执行与自动执行[Step-by-step execution and animation] 二一,Hit跟踪[Hit trace]
上传时间: 2016-01-02
上传用户:xhz1993
this will produce the dci program in the src/ directory, or in /path/to/your/installation/bin if you used the--prefix option during the configure step and issued a "make install".
标签: installation directory the produce
上传时间: 2016-01-04
上传用户:15071087253
matlab 实现系统的参数计算,系统单位阶跃响应的相关参数计算。Matlab real system parameters, the system unit step response of the relevant parameters.
上传时间: 2014-01-08
上传用户:曹云鹏
Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around the two are marked with a ‘3’ and the process is repeated iteratively until : The exit is found (a free square other than the starting position is reached on the very edge of the maze), or, No more free squares are available, and hence no exit is possible.
标签: method ink-blotting Blotting escaping
上传时间: 2014-12-03
上传用户:123啊
UNIX下的硬件代码检查工具的使用,step by step.Synopsys很好的工具文档。
上传时间: 2016-02-05
上传用户:英雄