About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
This paper introduces a software visualization system that: creates animations of programs without the programmer writing any animation code and provides a window interface that automatically displays program information, explicitly showing the scope and context of its data, and allowing considerable control over animation displays.
标签: visualization introduces animations software
上传时间: 2015-09-28
上传用户:xsnjzljj
This app illustrates how to use SMS interception. It provides a UI for managing multiple instant messaging conversations over SMS.
标签: interception illustrates provides managing
上传时间: 2013-11-27
上传用户:Late_Li
Streaming refers to the ability of an application to play synchronised media streams like audio and video streams in a continuous way while those streams are being transmitted to the client over a data network.
标签: synchronised application Streaming ability
上传时间: 2015-10-22
上传用户:athjac
在写论文的时候用到很多批量计算,这是一个简易的计算器。把excel内的数据按照列paste到txt文件。修改源码就可以计算数据了。简单但实用,并且是初学者学习如何处理文本文件的一个实例。问题email到fly-lion@126.com
上传时间: 2015-10-25
上传用户:firstbyte
The CUBA library provides new implementation of four general-purpose multidimensional integration algorithms: Vegas, Suave, Divonne, and Cuhre. Suave is a new algorithm, Divonne is a known algorithm to which important details have been added, and Vegas and Cuhre are new implementations of existing algorithms with only few improvements over the original versions. All four algorithms can integrate vector integrands and have very similar Fortran, C/C++, and Mathematica interfaces.
标签: multidimensional general-purpose implementation integration
上传时间: 2014-09-09
上传用户:gxf2016
It support IPv4 and IPv6 unicast and multicast and contains a trivial sender and a trivial receiver that can be used to send or receive arbitrary data over RTP. An implementation of generic forward error correction is planned, t
标签: and trivial multicast contains
上传时间: 2013-12-14
上传用户:金宜
Make and answer phone calls Detect tone and pulse digit from the phone line Capture Caller ID Support blind transfer, single-step transfer/conference, consultation transfer/conference, hold, unhold. Control of the local phone handset, microphone and speaker of the modem Send and receive faxes Play and record on the phone line or sound card Play music in background mode Silence detection VU Meter Wave sound editor that allows your end-users to edit their own sound files. Voice recognition and voice synthesis. Full control over the serial port device ZModem file transfer utility File compression and encryption utility
上传时间: 2013-11-30
上传用户:水中浮云
This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new code to the device over USB. This bootrom is installed at address 0x00000000 in the ARM, which means that it is the first piece of code to execute after reset. At startup, it waits for a few seconds to see if the downloader is trying to connect. If not, then the bootloader gives up control and jumps to your program. If the downloader is trying to connect, then the bootloader receives the new program over USB and writes it into flash.
标签: bootloader processors download permits
上传时间: 2015-11-30
上传用户:shus521
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0