虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

TOOL-play

  • Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

    Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.

    标签: the resource Netcat Swiss

    上传时间: 2017-04-02

    上传用户:onewq

  • -The existence of numerous imaging modalities makes it possible to present different data present in

    -The existence of numerous imaging modalities makes it possible to present different data present in different modalities together thus forming multimodal images. Component images forming multimodal images should be aligned, or registered so that all the data, coming from the different modalities, are displayed in proper locations. Mutual Information is the similarity measure used in this case for optimizing the two images. This method requires estimating joint histogram of the two images. The fusion of images is the process of combining two or more images into a single image retaining important features from each. The Discrete Wavelet Transform (DWT) has become an attractive tool for fusing multimodal images. In this work it has been used to segment the features of the input images to produce a region map. Features of each region are calculated and a region based approach is used to fuse the images in the wavelet domain.

    标签: present modalities existence different

    上传时间: 2014-03-04

    上传用户:15736969615

  • 在网络安全中经常会遇到rootkit

    在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

    标签: rootkit 网络安全

    上传时间: 2017-04-04

    上传用户:xaijhqx

  • CalcExpress is an interpreter for quick and easy evaluation of mathematical expressions. It is a sm

    CalcExpress is an interpreter for quick and easy evaluation of mathematical expressions. It is a smart tool easy in use. Supports 5 operators, parenthesis, 18 mathematical functions and user-defined variables

    标签: mathematical CalcExpress interpreter expressions

    上传时间: 2014-12-08

    上传用户:希酱大魔王

  • The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and da

    The main MIPS processor of SMP8630 comes with a JTAG interface, allowing:  access to caches and data bus (DRAM) with a bandwidth of about 200kbit/s  examining the processor state whatever the execution mode (monice)  connecting to monice using mdi-server and using a gdb client on the processor to step and break accurately whatever the execution mode  running semi-hosted applications  fl ash write tool  memory testing (MT command)  real-time traces: has not been built in CPU (Config3_TL=0) and only supported by MajicPLUS probes (maybe built into emulator?)

    标签: interface processor allowing access

    上传时间: 2013-12-19

    上传用户:youke111

  • Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world.

    Control your PC with Mobile Phone-it controls your pc using mobile phone from anywhere in the world. A command can be send by mobile phone through sms.Based on the command ur pc performs tasks such as shut down,open file,play music etc.

    标签: your Phone-it controls anywhere

    上传时间: 2017-04-13

    上传用户:四只眼

  • C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

    C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. We suggest that you immediately download these header files in order for an easier transition to understanding the 28xx peripherals.

    标签: Peripheral peripheral and Examples

    上传时间: 2014-01-24

    上传用户:fandeshun

  • JWebChart is a simple package to allow anyone to render complex charts using a Java Servlet. The pro

    JWebChart is a simple package to allow anyone to render complex charts using a Java Servlet. The product was primarily written to allow Warfare to render charts from data sources, which as a tool kit is specifically design for people with no programming knowledge

    标签: JWebChart Servlet complex package

    上传时间: 2013-12-19

    上传用户:Pzj

  • 基于struts框架制作

    基于struts框架制作,采用MVC模式,工程附加后把tool包下的jdbc文件改动一下就可以了,改到自己的数据库,

    标签: struts

    上传时间: 2017-05-02

    上传用户:Shaikh

  • this step-by-step guide makes learning Borland C++Builder programming a breeze. It鈥檚 the perfect le

    this step-by-step guide makes learning Borland C++Builder programming a breeze. It鈥檚 the perfect learning tool for beginning programmers who want to develop their own programming capabilities, and for developers who want to get up-to-speed with C++Builder quickly and easily.

    标签: step-by-step programming learning Borland

    上传时间: 2014-01-04

    上传用户:gxf2016